One of the leading computer security companies of Russia, Group-IB and its CERT (CERT-GIB), found that Android malware is available for sale by cybercriminals. With explosion of mobile market and increase of Android users, more devices can be infected by malware downloaded through Android Market or Google Play or from 3d party WEB-sites. âNowadays it is […]
Russian underground is considered one of the most prolific black market, it provides various services that allow cybercriminals to arrange sophisticated scams and provide all necessary tools to arrange a cyber attack. To get an idea of the main dynamics of a market so organized I suggest you follow the investigations of principal security firms […]
WebSense has just released 2013 Threat Report, an interesting analysis of cyber threats based on data collected by the Websense ThreatSeeker Network. The study confirmed the growth of cyber threats able to elude traditional defense mechanisms and that mainly targeted mobile platforms and social media. Internet is confirmed as primary vector for cyber menaces, web threats […]
Recent studies of principal security firms revealed that phishing activities in the last years have increased exponentially, cybercrime is targeting every sector from industry to government institutions and of course private citizens. RSAâs October Online Fraud Report 2012Â confirmed a large increase in phishing attacks, up 19% over the second half of 2011. The total loss […]
Zeus malware is considered the most popular and prolific malicious code for banking, it is one of the privilege agent by cybercrime the use to sell various customized version in the underground to conduct sophisticated frauds. Security community has found it in different occasion and anyway it was a surprice, the malware has evolved in […]
In the last weeks we discussed on the efficiency of exploit kits, malicious tool kits  that allow to the attackers to exploit a huge quantity of vulnerabilities in victims systems. These products are largely diffused in the underground where is possible to find different tools usable for various purpose, most precious are those kit that […]
Despite simplicity of the schema phishing attacks have increased exponentially in the last years targeting every sector,both public and private. RSAâs October Online Fraud Report 2012Â revealed a worrying scenario, phishing attacks increased up 19% over the second half of 2011, the total loss for various organizations has been estimated to $2.1 billion over the last […]
The recently discovered cyber espionage campaign âRed Octoberâ has shocked world wide security community, the principal questions raised are: Who is behind the attacks? How is possible that for so long time the campaign went undetected? Which is the role of AV company in these operations? To try to understand who is behind the attacks […]
The European Network and Information Security Agency (ENISA) is the EUâs agency responsible for cyber security issues of the European Union, its last report âENISA Threat Landscape – Responding to the Evolving Threat Environmentâ, summarizing the principal threats and providing also useful indication on the emerging trends. The report proposes the list of top threats […]
Social networks are platforms that have monopolized majority of userâs internet experience, the imperative is to âsocialâ, and everybody share an incredible amount of personal information exposing its digital identity to serious risks. An element of attraction for cyber criminals is the huge number of services, from gaming to payments, that are developing on these […]