• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • VNC instances exposed to Internet pose critical infrastructures at risk
  • SOVA Android malware now also encrypts victims' files
  • A new PyPI Package was found delivering fileless Linux Malware
  • Iron Tiger APT is behind a supply chain attack that employed messaging app MiMi
  • A flaw in Xiaomi phones using MediaTek Chips could allow to forge transactions
  • CISA, FBI shared a joint advisory to warn of Zeppelin ransomware attacks
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Malware (Page 362)

Malware

Dalai Lama + Mac OS X = APT with Tibet malware

Another excellent discovery of the active experts of Kaspersky Labs that have identified a new variant of the malware used in Tibet against Uyghur hacktivists, a Turkic ethnic group living in Eastern and Central Asia. The instance of Tibet malware...

June 30, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware  Security 

Capfire4, malware-as-a-service platform for crime

It’s not first time we discuss of cybercrime and in particular of its organizational models, creative servicex offer any kind of support to organizations and individuals that desire to conduct an attack against specific target. Cyber criminals in the past...

June 26, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware 

The mystery of a massive cyber attack on Iran

Winds of cyber war blow Iran, the political situation is becoming difficult to manage, exacerbating the tones of a psychological battle growing. After the publishing of the news regarding the genesis of Stuxnet and Flame every actor of the conflict...

June 23, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware  Security 

A virus specialized for AutoCAD, a perfect cyber espionage tool

In recent years we are assisting to a profoundly change in the nature of malware, it is increased the development for spy purposes, for its spread in both private and government sectors. The recent case of Flame malware has demonstrated the efficiency...

June 22, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

Malware and new sophisticated cyber techniques against banking

Money motivates the cyber assault to banking by cybercrime, but the finance world is also considered a privileged target for sponsored-state attacks as part of cyber offense strategies. Let's consider that the banking world is profoundly changing, the introduction...

June 20, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

On new generation of P2P botnets

Zeus is one of the longest-running malware that raged for months, appearing in various forms on the web thanks to the continuous changes made by the cybercrime industry. This time the news is really interesting, Symantec security researchers have detected...

June 18, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

The malware factory

Article Published on The Hacker New Magazine – June Edition “Malware” With the term malware we refer a heterogeneous family of malicious software designed with the purpose to disrupt computer operation, gather sensitive information, or gain unauthorized...

June 16, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Malware  Security 

Flame and Stuxnet, the union is strength

During the Global Media and Technology Summit Eugene Kaspersky, CEO of Kaspersky Lab, revealed to the Reuters agency that the team of experts of his company has found strong similarities between part of the Flame source code and a 2009 version of Stuxnet. The...

June 12, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware  Security 

‘Olyimpic Games’ and boomerang effect, it isn’t sport but cyber war

For years, we discuss the authorship of what is considered one of the most offensive cyber weapon of history, Stuxnet, a thousand voices were compared on the difficult question alternating assertions and denials. Always the principal international experts...

June 3, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware  Security 

Flame malware, from genesis to the plot theory

In this article I desire to discuss about many personal doubts and beliefs regarding the Flame malware, first my idea that we are facing with a new powerful cyber weapon. In the same hours  the Iranian Computer Emergency Response Team Coordination...

May 30, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Intelligence  Malware  Security 


« First‹ Previous358359360361362363364365366Next ›Last »
Page 362 of 369



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT