Cyber Crime

Akamai Threat Advisory – Evolution of DDoS attacks

According to the US-based Akamai Technologies Distributed Denial Of Service (DDoS) attacks have a great level of sophistication today. The Morris…

9 years ago

Is the Infocube firm tied to the Carbanak cybercrime gang?

The security expert Brian Krebs investigated the links between the Carbanak cybercrime gang and the Infocube security firm. Today I…

9 years ago

Snowden and Bunnies devised the Introspection Engine to avoid surveillance

The NSA whistleblower Edward Snowden and the popular hacker Andrew “Bunnie” Huang designed Introspection Engine, an interesting anti-surveillance device. While…

9 years ago

Feds arrested the KickassTorrents owner and seized the domain names

The federal authorities have arrested the alleged mastermind behind KickassTorrents (KAT) and seized its domains, blocking its operations. According to…

9 years ago

The threat of Ransomware

Recently, Reuters reported that the FBI sent an urgent confidential 'Flash' message to businesses and organizations to warn them about…

9 years ago

Is Phineas Fisher behind the AKP hack that allowed the disclosure of Erdogan Emails?

One of the most popular hacktivists, Phineas Fisher claimed responsibility for the hack of the Turkish Government that lead the…

9 years ago

Major websites compromised in the last SoakSoak campaign

A large number of business websites have been compromised by the SoakSoak gang to deliver ransomware. Security experts from Invincea…

9 years ago

Delilah, the first Trojan to recruit Insiders

Delilah is the first extortion trojan that spies on victims and collects information to force them in doing malicious activities…

9 years ago

cuteRansomware leverages Google Docs to avoid detection

A newly strain of ransomware dubbed cuteRansomware leverages on a Google Doc to host the decryption key and command-and-control features.…

9 years ago

Abusing Two-factor authentication to steal money from Instagram, Google and Microsoft

A security expert revealed a number of flaws in the big player’s two-factor authentication methods that could allow crooks to…

9 years ago

This website uses cookies.