• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Orchard botnet uses Bitcoin Transaction info to generate DGA domains
  • Twilio discloses data breach that impacted customers and employees
  • LogoKit update – The phishing kit leveraging Open Redirect Vulnerabilities
  • Attackers abuse open redirects in Snapchat and Amex in phishing attacks
  • Microsoft is blocking Tutanota email addresses from registering a MS Teams account
  • Serious cyberattack hits German Chambers of Industry and Commerce (DIHK)
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Reports (Page 31)

Reports

GDATA on Android malware. 4,900 new strains discovered every day

Every 18 seconds a new mobile Android malware is discovered in the wild as reported in the G DATA Malware Report Mobile for Q1 2015. Security firm GDATA has published a report on mobile malware detected in the first quarter of 2015. The researchers...

July 3, 2015  By Pierluigi Paganini   Posted In  Breaking News  Malware  Mobile  Reports 

Dino Malware that targeting Iran belong to Animal Farm’s arsenal

Researchers at ESET analyzed the Dino malware confirming that the sophisticated espionage platform belongs to the arsenal of the Animal Farm APT. Security experts at ESET have analyzed Dino, a sophisticated platform used by the Animal Farm ATP group. Earlier...

July 1, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Intelligence  Malware  Reports 

Security Affairs newsletter Round 15 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Password Recovery Scam – how to hack a Gmail account Signal amplification and brute-force...

June 28, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Cyber warfare  Digital ID  Hacking  Malware  Reports  Security 

SEC investigates FIN4 hackers who target publicly traded firms

The U.S. Securities and Exchange Commission (SEC) is investigating on the activities related to a FIN4 APT targeting executives at publicly traded firms. The U.S. Securities and Exchange Commission (SEC) has launched an investigation on the activities...

June 26, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Reports  Security 

Darknets in the Deep Web, the home of assassins and pedophiles

Security experts at Trend Micro published a report on the Deep Web and related illegal activities that exploit the darknets it contains. Experts at TrendMicro published an interesting report on the Deep Web focusing their analysis on the services...

June 26, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Reports 

Bad Actors behind the Dyre botnet operates like a business

Experts at Symantec observed a significant upsurge in activity over the past year for the Dyre financial Trojan used to target banking customers worldwide The operators behind the popular Dyre banking trojan appear very active in this period, according...

June 25, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Malware  Reports  Security 

Electronic Frontier Foundation – WhatsApp ranked as the worst at protecting users’ privacy

The Electronic Frontier Foundation published the "Who Has Your Back? 2015" report that ranked WhatsApp ranked as the worst in protecting users' privacy. The Electronic Frontier Foundation has published its annual report "Who Has Your Back? 2015:...

June 21, 2015  By Pierluigi Paganini   Posted In  Breaking News  Digital ID  Laws and regulations  Reports  Security 

Cybercrime is paying with 1,425% return on investment

Trustwave firm published a report related to 2014 incidents that revealed cyber criminal activities are paying with 1,425% return on investment. Hackers are seeing a whopping 1,425% return on investment for these two kinds of attacks Security experts...

June 19, 2015  By Pierluigi Paganini   Posted In  Breaking News  Malware  Reports 

Cyber attacks against VOIP systems on the rise

Security experts at Nettitude reported that VoIP (Voice over IP) infrastructures worldwide are targeted by a growing number of cyber attacks. A new wave of attacks against Voice over IP (VoIP) systems is targeting UK businesses, security experts believe...

June 17, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Reports  Security 

$38 an hour is the cost of destructive DDos Attacks

DDOS attacks have become cheaper than one can think, just because of the era of DDOS-for-hire services. However, such attacks are easier to launch now and don't cost much, but when it comes to the victim - it costs $40,000 per hour to them considering...

June 15, 2015  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime  Hacking  Malware  Reports 


« First‹ Previous272829303132333435Next ›Last »
Page 31 of 35



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT