• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • VMware addresses ESXi issue disclosed at the Tianfu Cup hacking competition
  • CVE-2019-14899 flaw allows hijacking VPN connections on Linux, Unix systems
  • OpenBSD addresses authentication bypass, privilege escalation issues
  • China used the Great Cannon DDoS Tool against forum used by Hong Kong protestors
  • CyrusOne, one of the major US data center provider, hit by ransomware attack
  • The evolutions of APT28 attacks
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Security (Page 207)

Security

Hacktive Security discoveries flaw in Ruzzle protocol that menaces user’s privacy

Researchers at Hacktive Security, an independent security consulting company, have demonstrated how much insidious could be a so a simple and crimeless large scale application. We are in the digital era, everything is connected to the large networks...

April 2, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Webroot – Impact of Web-borne threats on businesses

Webroot has recently published an interesting study, available here (registration required), on latest Web-borne threats and their economic impact providing also useful suggestions on how to implement an effective defense. The survey revealed...

April 1, 2013  By Pierluigi Paganini   Posted In  Security 

First APT attack on Android targeted Tibetan & Uyghur activists

Read about APT attacks has become customary, even easier to hear of attacks against political dissidents or minorities as Tibetan and Uyghur activists, but never before has been exploited the Android platform for this type of offensive. In the past Tibetan...

March 27, 2013  By Pierluigi Paganini   Posted In  Intelligence  Malware  Security 

#OpIsrael & attack to Mossad,cyber dispute or misinformation campaign?

Israel is considered by various group of hacktivists an enemy state to fight, for this reason they decide a joint operation to start on April 7th as part of #OpIsrael.  The attack started in 2012 against the protest against Israeli bombing of Palestinian territory,...

March 26, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Multiplatform Wiper widespread in attacks against South Korea

Recently South Korea has been hit by powerful cyber attack malware based, network provided by LG UPlus Corp was hacked by a group calling itself the “Whois Team”. The attack targeted also media and banking of the country, television networks YTN,...

March 25, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Malware  Security 

CrySyS Lab revealed a decennial cyber espionage operation by TeamSpy

Last week was monopolized by the discussion on cyber attacks that hit North and South Korea, but I found a news equally stunning, researchers at Hungary-based CrySyS Lab have discovered a decade-long cyber espionage campaign that targeted high-level...

March 24, 2013  By Pierluigi Paganini   Posted In  Intelligence  Malware  Security 

T-Mobile MITM, a starting point to discuss mobile security

Many times we discussed about large diffusion of mobile devices and of related cyber threats, around a months ago I presented the case of HTC mobile that revealed 18 million devices commercialized by Taiwanese company had security flaws that could exposes...

March 23, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

CNCERT – China is also a victim of cyber attacks

Recent cyber attacks against North and South Korea are inflaming the debate on the importance of cyber security, governments are massively investing in the improvement of cyber capabilities to be prepared to mitigate the increasing number of offensives. China...

March 22, 2013  By Pierluigi Paganini   Posted In  Malware  Security 

FinFisher found everywhere, more complexity and ready for mobile

Many times we discussed about the fact that FinFisher was discovered in the wild, the use of popular spyware has been abused by governments and intelligence agencies all around the world. The spyware is for law enforcement and government use, but it seems...

March 20, 2013  By Pierluigi Paganini   Posted In  Intelligence  Malware  Security 

N. Korea hit by large-scale cyber attack,repercussions in cyberspace

North Korea is the center of attention these days for its questionable political strategies and for the dispute raging with the entire West. The contrasts have an inevitable reflection even in cyber space, North Korea is considered one of the most aggressive...

March 19, 2013  By Pierluigi Paganini   Posted In  Cyber warfare  Security 


« First‹ Previous203204205206207208209210211Next ›Last »
Page 207 of 248




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Necessary Always Enabled