• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • The launch of Williams new FW43B car ruined by hackers
  • Chinese hackers allegedly hit thousands of organizations using Microsoft Exchange
  • Russia-linked APT groups exploited Lithuanian infrastructure to launch attacks
  • Security Affairs newsletter Round 304
  • REvil Ransomware gang uses DDoS attacks and voice calls to make pressure on the victims
  • Multiple Cisco products exposed to DoS attack due to a Snort issue
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Malware (Page 292)

Malware

Iran, the cyber threat … are we creating a new enemy ?

"Iran, the super power capable of threatening the world". This is the title of a hypothetical sensationalist article aimed to enhance the computer skills of a nation of which little is known. In recent weeks the strange coincidence of events is helping...

December 24, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence  Malware  Security 

What should we expect from next cyber weapon? Hypothesis on Stuxnet 3

This 2011 was the year of the consecration of cyber weapons from a mediatic point of view. Awareness of the threat has been shared by all the major states of the world. This weapons could be been used in cyber attacks, claiming victims from cyberspace...

December 23, 2011  By Pierluigi Paganini   Posted In  Hacking  Malware  Security 

Malware attacks Georgia Hospital, have we learnt the lesson?

The medical industry is historically one of the sectors that has benefited more than others for the introduction of technology. Devices allow ever more complex operations every day to millions of patients and to medical equipments, from health conditions...

December 21, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware  Security 

Duqu – The worst may still have to come for critical infrastructures

Duqu, a name that we are reading since several months and with whom we have called a malware that scares the scientific community for some features we will shortly describe. I wrote a lot in this blog about Duqu and on more than one occasion we have raised...

December 19, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Hacktivism  Intelligence  Malware  Security 

SCADA and vulnerabilities to critical infrastructures

Over the last few months there have been different events that led to the story than they can be dangerous attacks on SCADA systems used to control production processes in industrial plants of various kinds, from industrial production to the provision...

December 18, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence  Malware  Security 

Software piracy,from statistics to hypotheses of cyber warfare

With the term software piracy is referred the illegal distribution or reproduction of software for business or personal use. Whether software piracy is deliberate or not, it is still illegal and punishable by law. We distinguish several type of software...

December 17, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware  Security 

Carrier IQ, the privacy of millions of users has been violated

In recent weeks we have learned of a dialer able to track our movements, spy on our communications, read our SMS ... the privacy of millions of users has been violated!  A disturbing application, multi-platform, which had not been reported previously. The...

December 14, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence  Laws and regulations  Malware  Security 

India The blurred line between defense and cyber censorship

In this article I wish to bring to your attention what I regard as gross contradiction of a nation whose people I admire for their professionalism and dedication to work, India. In my previous article “Cyber India” lights and shadows of the country...

December 11, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence  Laws and regulations  Malware  Security  Social Networks 

“Need an expert in customized botnet.” … new recruiting channel.

In recent weeks we have discussed a lot about cyber crime and how it is assuming frightening proportions. A growing business in which a huge number of organizations have taken an interest. The cyber space considered as an open ocean in which there is anarchy...

December 10, 2011  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence  Malware  Security 

Top Nine cyber security trends for 2012? They are too few, isn’t it?

In this article I intend to read with you an interesting document, distributed by Imperva, in which they emphasized, the main threats that could cause significant problems in the coming year.  Please carefully read the entire article, first...

December 9, 2011  By Pierluigi Paganini   Posted In  Digital ID  Malware  Security  Social Networks 


« First‹ Previous288289290291292293294Next ›
Page 292 of 294



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT