• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Russia is going to disconnect from the internet as part of a planned test
  • A new batch of 127 million records appears in the dark web
  • Astaroth Trojan relies on legitimate os and antivirus processes to steal data
  • Cryptojacking Coinhive Miners for the first time found on the Microsoft Store
  • Group-IB helped to arrest phone scammers profiting off the backs of the Russian elderly
  • Coffee Meets Bagel dating app confirms data breach
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Reports (Page 23)

Reports

Reading the Secunia Vulnerability Review 2015

Secunia firm issued its annual report on vulnerabilities exploited in 2014 in most popular software, a document which includes key figures and facts. Secunia has recently released its annual study of trends in software vulnerabilities, an interesting...

March 27, 2015  By Pierluigi Paganini   Posted In  Breaking News  Hacking  Reports 

IBM X-Force reported a billion data records leaked in 2014

Within the year of 2014, a lot of data was leaked and this leads to grave concerns as to the future of overall online security. Unfortunately, 2014 was one of the worst years and the reason of that was that a lot if viruses and attempts of violation...

March 19, 2015  By Pierluigi Paganini   Posted In  Breaking News  Reports  Security 

IoT security is still a pipe dream

A research conducted by experts at Symantec highlights disturbing security failures in the IoT devices present in today connected home. The purpose of IoT is connect all type of devices that we have at home, let's say I am at my work and I want to arrive...

March 17, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Reports  Security 

Cyber attacks against Organizations increased once again

71 percent of organizations were victims of successfully cyber attacks in 2014 according to the “2015 Cyberthreat Defense Report” report. The CyberEdge Group published an interesting report, titled “2015 Cyberthreat Defense Report” that in...

March 16, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Cyber warfare  Hacking  Reports  Security 

ICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has issued its new ICS-CERT MONITOR...

March 16, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Cyber warfare  Hacking  Reports  Security 

2,400 unsafe applications found in average large enterprise

A recent study published by Veracode on mobile security revealed that 2,400 unsafe applications are in average installed in large enterprise. Mobile devices are becoming an integral part of the enterprise architecture, security depends heavily on the use that...

March 14, 2015  By Pierluigi Paganini   Posted In  Breaking News  Mobile  Reports  Security 

80 percent of merchants fail PCI DSS compliance assessment

The Verizon's 2015 PCI Compliance Report reveals that eighty percent of merchants fails interim PCI DSS compliance assessment. According to a new report by Verizon Communications Inc., nearly 80 percent of global merchants, including retailers, financial...

March 13, 2015  By Pierluigi Paganini   Posted In  Breaking News  Reports  Security 

EquationDrug, the hacking platform of the Equation Group APT

Experts at Kaspersky Lab published a detailed analysis of the EquationDrug platform and its modules developed by the Equation Group APT. Recently experts at Kaspersky Lab have uncovered the Equation Group hacking crew, the most sophisticated ever APT....

March 12, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber warfare  Intelligence  Reports 

Identity Fraud Cost US Consumers $16 billion in 2014, less than in 2013

The annual study published by Javelin Strategy & Research on identity fraud estimates that U.S. consumers actually suffered fewer losses than in the past. Last year we observed a significant number of data breaches that cause the exposure of a huge...

March 5, 2015  By Pierluigi Paganini   Posted In  Cyber Crime  Digital ID  Reports 

Financial Trojans in 2014 – Symantec reports a significant drop in infections

Symantec revealed observed a significant drop in the number of  Financial Trojans in 2014, a report includes a detailed analysis of the phenomena. Symantec has analyzed the evolution of Financial Trojans in 2014 highlighting a significant drop in the number...

March 5, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware  Reports 


« First‹ Previous192021222324Next ›
Page 23 of 24




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More