• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Security Affairs newsletter Round 243
  • US authorities charged Dridex gang members for stealing over $100 Million
  • Vietnam-linked Ocean Lotus hacked BMW and Hyundai networks
  • Russia-linked Gamaredon group targets Ukraine officials
  • VMware addresses ESXi issue disclosed at the Tianfu Cup hacking competition
  • CVE-2019-14899 flaw allows hijacking VPN connections on Linux, Unix systems
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Cyber warfare (Page 66)

Cyber warfare

Syrian Electronic Army hit NYT and Twitter

The group of Syrian Electronic Army hackers is intensification its hacking campaign pro-Assad. Details of the attacks against the HuffingtonPost UK, Twitter and the NYT. The Syrian Electronic Army once again successful in an attack, to be precise...

August 29, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Security 

Information Warfare, Russia, New Zeland…it is arms race

Information warfare, under this term governments are working to improve their cyber capabilities, last in order of time are Russia and the New Zeland. Information warfare, cyber warfare, are all terms that are becoming familiar for population all over...

August 27, 2013  By Pierluigi Paganini   Posted In  Cyber warfare 

The cyber capabilities of Iran can hit US

A study titled “Iran:How a Third Tier Cyber Power Can Still Threaten the United States" states that Iran has sufficient cyber capabilities to attack the US Iran has sufficient cyber capabilities to attack the US causing serious damages to the critical...

August 14, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Intelligence 

Credit Card Redirection, the evolution of phishing

Researchers at Securi discover Credit Card Redirection attack technique to hijack credit card data during transactions on e-commerce sites. With the term credit card redirection is indicated the illegal practice to steal credit and debit card information...

July 30, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Security 

Hackers hit South Korea also spread spyware to steal military secrets

Mc Afee Lab experts revealed that hackers behind large scale cyberattacks against South Korea also designed malware to steal military secrets. The hackers behind the recent attacks against South Korean infrastructure are professionals that designed also...

July 9, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Security 

Watering hole attacks and exploit kits – Indian gov site case

Number of Watering hole attacks is increasing, most of them based on well known exploit kits. The case of compromised Indian gov Web site leads to BlackHole Watering Hole attacks increase in a meaningful way in the last years following a scaring trend,...

May 27, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking 

New wave of cyber attacks from Iran hit US

New cyber attacks from Iran hit US enterprises focusing on energy sector, the offensive has been revealed by American officials and private security experts. A new series of cyber attacks from Iran hit US enterprises, the offensive has been revealed...

May 26, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Security 

Zero-day market, the governments are the main buyers

Governments, and in particular US one, are principal buyers of zero-day vulnerabilities according a report published by Reuters. Zero-days exploits are considered a primary ingredient for success of a cyber attack, the knowledge of zero-day flaw gives...

May 21, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Malware  Security 

China vs US mutual accusations, the cyber cold war is begun

China and US governments continue to exchange accusations about the continuing incursions into the respective national networks. China and US governments continue to exchange accusations about the continuing incursions into the respective national networks,...

May 9, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Security 

Verizon, large scale cyber espionage from China and much more

Verizon has issued the “2013 Data Breach Investigations Report” that investigates on a series of documented data breaches. Verizon’s RISK Team, in collaboration with other 18 partners, has issued the “2013 Data Breach Investigations Report”...

April 24, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Intelligence  Malware  Security 


« First‹ Previous626364656667686970Next ›Last »
Page 66 of 81




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Necessary Always Enabled