• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • VNC instances exposed to Internet pose critical infrastructures at risk
  • SOVA Android malware now also encrypts victims' files
  • A new PyPI Package was found delivering fileless Linux Malware
  • Iron Tiger APT is behind a supply chain attack that employed messaging app MiMi
  • A flaw in Xiaomi phones using MediaTek Chips could allow to forge transactions
  • CISA, FBI shared a joint advisory to warn of Zeppelin ransomware attacks
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber Crime (Page 456)

Cyber Crime

Citadel trojan, migration of cybercrime to the deep web

We all remember the Citadel trojan, based on  the Zeus experience has evolved becoming one of the most interesting cyber criminal project. Few months ago I wrote on the excellent customer relationship management (CRM) model implemented by its creators....

July 4, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Deep Web  Malware  Security 

Capfire4, malware-as-a-service platform for crime

It’s not first time we discuss of cybercrime and in particular of its organizational models, creative servicex offer any kind of support to organizations and individuals that desire to conduct an attack against specific target. Cyber criminals in the past...

June 26, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

A virus specialized for AutoCAD, a perfect cyber espionage tool

In recent years we are assisting to a profoundly change in the nature of malware, it is increased the development for spy purposes, for its spread in both private and government sectors. The recent case of Flame malware has demonstrated the efficiency...

June 22, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Wikiboat against the Pentagon, risks on Anonymous evolution

We live in the cyber era, governments measure their capabilities in the cyberspace with reciprocal attacks of increasing complexity.Every government is developing an adequate cyber strategy investing huge quantity of money in the establishment of cyber...

June 21, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence  Security 

Malware and new sophisticated cyber techniques against banking

Money motivates the cyber assault to banking by cybercrime, but the finance world is also considered a privileged target for sponsored-state attacks as part of cyber offense strategies. Let's consider that the banking world is profoundly changing, the introduction...

June 20, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

On new generation of P2P botnets

Zeus is one of the longest-running malware that raged for months, appearing in various forms on the web thanks to the continuous changes made by the cybercrime industry. This time the news is really interesting, Symantec security researchers have detected...

June 18, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

The malware factory

Article Published on The Hacker New Magazine – June Edition “Malware” With the term malware we refer a heterogeneous family of malicious software designed with the purpose to disrupt computer operation, gather sensitive information, or gain unauthorized...

June 16, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Malware  Security 

Cyber security during sporting events

Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 05 2012.  The article offers an overview on cyber security issues relating to sports events, competitions that are a priority target for terrorists and...

June 13, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence  Security 

Anonymous, #OPIndia against censorship

Again Anonymous, again another hack in the name of freedom and against the censorship, this time the famous Anonymous have attacked the Mahanagar Telephone Nigam Limited (MTNL), bringing down its web site because the company is responsible of internet...

June 11, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

Google Online Security against state-sponsored attacks

According to a post of Eric Grosse, VP of security engineering at Google, on Google Online Security blog the company is constantly monitoring the web for malicious activity on its systems, with particular attention to attacks made by third parties to illegally...

June 9, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Security 


« First‹ Previous452453454455456457458459460Next ›Last »
Page 456 of 466



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT