• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Rooster Teeth Productions suffered a payment card breach
  • New Orleans hit by ransomware, US cities continues to be under attack
  • Flaws in Siemens SPPA-T3000 control system expose power plants to hack
  • SEC Charges Shopin Founder with fraud over unregistered $42M ICO
  • A flaw in outdated versions of Beaver Builder and Elementor plugins allows hacking WordPress sites
  • VISA warns of cyber attacks on PoS systems of fuel dispenser merchants
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Security (Page 223)

Security

Microsoft distrupts Nitol botnet, malware hidden in supply chain

The malware diffusion is assuming dimension difficult to control, no matter if we are facing with a state-sponsored attack or with a cyber scam, malicious agents are around us, they have infected a huge quantity of machines with dramatic consequences. But...

September 16, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Intelligence  Malware  Security 

Botnet, pro & cons of using Tor Networks

As declared several time Deep Web, thanks to the anonymity of its connection, provides to cyber criminals an ideal environment to grow up profitable business. We have mainly discussed of deep web such as a portion of cyber space mainly used to sell any kind...

September 14, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

Cybercrime evolution in North America and Western Europe

Despite cyber space is known as a domain without border an interesting study of the Kaspersky Security firm demonstrates that cyber criminal activities are mainly located in some area of the planet, as we can see also the victims of the attacks have a geographical...

September 13, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Malware  Security 

All you have to know on DDoS attack against GoDaddy

Yesterday was a terrible day, late afternoon in Europe Time, I noted that my blog Security Affairs, was down. I received several messages from my readers but when I tried to investigate on the reasons I discovered, with a great surprise, that the entire...

September 11, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

Rapid 7, analysis on data breach incidents

Security Firm Rapid 7 has published an interesting analysis on government data breach reported from January 1, 2009 to May 31, 2012. The document present a worrying scenario in which 268 incidents exposed more than 94 million records containing sensible...

September 11, 2012  By Pierluigi Paganini   Posted In  Security 

Part 1: Authentication Series – A world of passwords

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins In our previous articles we discussed malware, phishing, viruses and other computer infections designed to maliciously...

September 10, 2012  By Pierluigi Paganini   Posted In  Security 

Elderwood project, who is behind Op. Aurora and ongoing attacks?

Today I desire to discuss on the real effect of a cyber attack, we have recently introduced the direct and indirect effects of the several cyber espionage campaigns discovered such as Flame and Gauss, but we never approached the problem in future projection...

September 9, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Security 

Dangerous waves of malware are transforming cyberspace in a jungle

The cyberspace is becoming a jungle of malware, a place where the danger is just around the corner. Governments, cyber criminals, hacktivist and terrorist are focusing their activities in the new domain due this reason we are assisting to the born of new agents...

September 7, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Malware  Security 

2012 Norton Cybercrime report, a worrying scenario

Here we are with the regular appointment with Symantec and its report on cybercrime " The yearly Norton Cybercrime report", a document that analyzes the evolution of  cyber criminal activities and their impact on the society. The report covers different...

September 6, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Security 

Large-scale monitoring, few hours to identify file-sharers

We have often discussed the fact that governments and intelligence agencies regularly use tools to spy on communications and navigation data of millions internet users. The market monitoring is a thriving market, where revenue opportunities are high...

September 5, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Intelligence  Security 


« First‹ Previous219220221222223224225226227Next ›Last »
Page 223 of 248




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Necessary Always Enabled