Cyber Crime

Cost of cybercrime continues to increase for US companies

The Ponemon Institute as published its fifth report on the cost of cybercrime which provides interesting data on impact on…

10 years ago

Malvertising campaigns hit US military industry to steal secrets and intellectual property

A new wave of malvertising attacks finalized to cyber espionage is targeting military contractors to military secrets and intellectual property.…

10 years ago

Analyzing the HIGH-TECH CRIME TRENDS 2014 Report

Group-IB published the annual HIGH-TECH CRIME TRENDS 2014 Report, a document focused on high-tech crimes associated with traditional computer crime.…

10 years ago

South Korea need to overhaul the national ID system

ID system of South Korea faces a significant overhaul in response to major data breaches occurred in the last years…

10 years ago

Security Companies united against the Hidden Lynx APT and its weapons

Principal security firms united in a joint effort dubbed Operation SMN against the cyber espionage group known as Hidden Lynx…

10 years ago

Millions vulnerable UPnP devices vulnerable to attack

Researchers at Akamai firm have issued a report on reflection and amplification DDoS attacks exploiting vulnerable UPnP devices worldwide. Researchers…

10 years ago

7 million DropBox credentials apparently leaked

Hundreds of Dropbox Passwords allegedly Leaked were publisehd online, but the company reassures its users confirming that its systems were…

10 years ago

Kmart, another ordinary story of Credit Card Data Breach

Kmart revealed that an undisclosed number of credit card data belonging to its customers were stolen in a data breach which…

10 years ago

WAAR report – Web Attacks continue to increase, especially those launched from Amazon servers

The WAAR report issued by Imperva states that Web Attacks increasingly launched from Amazon servers, the overall number of attacks…

10 years ago

Threat actors phishing for Intellectual property and source code from IT giants

FireEye CEO David DeWalt explained that threat actors are targeting IT giants for source code and highlighted the importance to…

10 years ago

This website uses cookies.