• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Livecoin halted operations after the December attack
  • FireEye releases an auditing tool to detect SolarWinds hackers' activity
  • Malwarebytes 's email systems hacked by SolarWinds attackers
  • Raindrop, a fourth malware employed in SolarWinds attacks
  • FreakOut botnet target 3 recent flaws to compromise Linux devices
  • Vishing attacks conducted to steal corporate accounts, FBI warns
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Malware (Page 269)

Malware

Android Hack-Tool discovered by F-Secure

Android Hack-Tool discovered by F-Secure confirming that cyber threats targeting Android devices are rapidly growing in quantity and sophistication level. F-Secure has recently announced the discovery of an Android Hack-Tool that is able to steal data...

July 3, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Android botnets on the rise – case study

Principal Security experts are confident that in the next months we will assist to the explosion for Android botnets and in general of mobile cyber threats. Mobile botnets are malicious infrastructures that are increasing with impressive trend especially...

July 1, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Self-propagating ZeuS source code offered for sale in the underground

A new variant of Zeus trojan is offered for sale in the underground. It is a Self-propagating version that exploits Facebook, the RDP and the email. The criminal history taught us that after the diffusion of source code of malicious agent such as the popular...

June 30, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

Opera infrastructure hacked and digital certificate stolen

Opera software revealed that its infrastructure was attacked and a digital certificate has been stolen to sign malware and to deceive victims. On June 19th Opera suffered a cyber attack that was uncovered and contained by the same software company, the news...

June 28, 2013  By Pierluigi Paganini   Posted In  Hacking  Malware 

Anonymous and state-sponsored hackers threaten energy sector

The energy sector is threaten with increasing frequency by hacktivists, state-sponsored hackers and cybercriminals... The number of cyber attacks against energy sector is increased creating great concerns within the security community. Oil and gas firms...

June 24, 2013  By Pierluigi Paganini   Posted In  Hacking  Malware  Security 

Carberp banking Trojan source code for sale at $5K in the underground

Security firm Group-IB has discovered on an forum in the underground the sale for Carberp banking Trojan source code at $5K. Carberp banking Trojan is experiencing a new youth in the underground, in the last months investigation at security firm Group-IB...

June 19, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

Zeus Trojan steals funds and recruits Money Mules

Security firm Trusteer detected a new variant of Zeus Trojan that steals funds and recruits Money Mules proposing jobs ads to the victims using Man-in-the-Browser (MitB) techniques. Zeus Trojan is becoming even more complex, its evolution is unpredictable...

June 18, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

RARSTONE, TrendMicro revealed Naikon cyberespionage campaign

RARSTONE is the name of the RAT (REMOTE ACCESS TOOL) used in a cyber espionage campaign dubbed "Naikon" uncovered by security experts at TrendMicro. Security experts at TrendMicro revealed to have detected the RARSTONE RAT studying targeted attacks across...

June 16, 2013  By Pierluigi Paganini   Posted In  Malware 

Zeus Evolution.Is RBN really linked to Facebook Zeus variant?

Is RBN (Russian Business Network) really linked to Facebook Zeus variant? Exclusive interview with WhiteHat who has investigated on the malware. RBN or ordinary crime, Zeus is appearing in new forms and using new infection channels but according some...

June 12, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Social Networks 

Kaspersky Lab experts detected most sophisticated Android trojan

Security researchers at Kaspersky Lab detected a new instance of Android trojan, dubbed Obad, that they have judged as the most sophisticated malware found since now. Security experts at Kaspersky Lab detected a new instance of Android trojan that...

June 11, 2013  By Pierluigi Paganini   Posted In  Malware 


« First‹ Previous265266267268269270271272273Next ›Last »
Page 269 of 289



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.