Hackers hit ATM systems forcing them to dispense the cash stored in their money cases relying on certain commands sent through a smartphone. Cybercriminals can hack ATM systems and force it to dispense the cash using a smartphone, in the specific case a Samsung Galaxy 4 phone. The model of smartphone is not important, the […]
Security company Cyphort has discovered a malvertising campaign that targeted several websites via AOL Ad-Network, including the Huffington Post. Security experts at Cyphort firm discovered a new malvertising campaign that hit numerous websites, including the Huffington Post and LA Weekly. The attackers exploited the AOL ad network to run the malicious campaign, Cyphort detected the attacks for the first […]
The UK-based Bitcoin exchange Bitstamp has temporarily suspended its service in the wake of a major cyber attack against company online systems. The UK-based Bitcoin exchange Bitstamp has temporarily suspended its service in wake of compromise. Bitstamp announced that its systems suffered a major cyber attack, which lead to the theft of “less than 19,000 BTC”. “We have […]
The Microsoft Malware Protection Center (MMPC) has recently observed a surge in the infections of malware using macros to spread their malicious code. The Microsoft Malware Protection Center (MMPC) is warning Office users on the diffusion of malicious macros through email attachments or social engineering websites. A macro is a series of commands and instructions that […]
Many gamers are finding purchases that they never made their accounts for Electronic Arts Origin service. Once again the gaming industry under attack. There is no peace for the companies operating in the gaming industry. During Christmas holidays, the hackers of Lizard Squad brought down the PSN and Xbox live services, while yesterday the hacking […]
CYBERPOL PUBLISHES THE FIRST INTERNATIONAL CYBERBOK BODY OF KNOWLEDGE ON CYBER CRIME RISK MANAGEMENT. The cyber crime body of knowledge is the application of risk management to cyber crime context in order to manage virtual space risk and vulnerabilities, i.e.: The business risk associated with the use of: cyber space, cybernet, e-cyber operation, virtual space […]
Cybercrime is a dangerous and attractive lifestyle for young cyber talents. Which are the strengths of a winning model that is hard to fight? The Director of the European police agency Europol, Rob Wainwright, has provided illuminating details on the evolution of the cyber criminal ecosystem. The number of cyber crimes is growing rapidly, their level […]
A recent study conducted by researchers at the University of Portsmouth revealed that over 80 Percent of Tor network visits is related to pedo sites. In the last couple of years a growing number of security experts are focusing their research on Darknet, a portion of the Deep Web often used by the criminal underground to […]
A member of the Lizard Squad hacking group that shutdown the Play Station Network and the Xbox live service networks has been arrested by the UK police. In these days, we have followed the news related to hacking team known as the Lizard Squad who became famous for having ruined Christmas for millions of users of PSN […]
A member of the Lizard Squad team confirmed that its group provided stolen data to GoP that was used in the attack against the Sony Pictures. The cyber criminal ecosystem is a very complex environment to monitor and analyze, many events occurred in the cyberspace seemingly unrelated, instead are connected by a thin line. This […]