Cyber Crime

Pierluigi Paganini May 23, 2014
Sophisticated Google Drive Phishing Scam is becoming popular

Security experts at Symantec have discovered a new phishing scheme based on Google Drive that is being used by hackers to steal Google Account credentials Phishing scammers are exploring new technique to conduct illicit activities, in the recent weeks we have already discussed on the efficiency to use Google Docs and Google Drive  for phishing campaigns. Google Drive popularity […]

Pierluigi Paganini May 22, 2014
Chip-and-PIN cards easily cloning with the pre-play attack

A team of British researchers discovered a series of security flaw, Pre-Play Vulnerability, which allow Chip-and-PIN Payment Card Cloning. The recent incident to the US giant retailers Target and Neiman Marcus has raised the debate on the real level of security of credit/debit cards used by US citizens, in response VISA and Mastercard are accelerating the migration […]

Pierluigi Paganini May 20, 2014
5 Chinese PLA officials accused of cyber espionage on US companies

The United States has filed criminal charges against five Chinese military PLA officials for cyber espionage and hacking against several US companies. The United States early this week charged five Chinese military PLA officers and accused them of hacking into computers of American companies. US authorities accused the China’s People’s Liberation Army officers of hacking […]

Pierluigi Paganini May 18, 2014
Criminals capture PINs over wireless remotely instead tamper ATMs

Criminals are exploiting news tactics to steal user’s PIN from ATMs, capturing them over wireless network instead risky tampering of the banking machine. Cyber criminals are adopting even more creative and sophisticated methods to collect user’s personal information, of course banking data is very attractive for hackers that could decide to directly use it for cyber frauds, […]

Pierluigi Paganini May 18, 2014
New private Exploit-Kit “Infinity” available on the underground

Security Experts at Intercrawler have discovered in the underground a new Exploit-Kit dubbed “Infinity” which might be a new replacement of “Blackhole” Security expert at IntelCrawler, a cyber threat intelligence firm based in Los Angeles, discovered a new private exploit-kit called “Infinity” in the underground. It isn’t a distribution on a large-scale, authors reserved it […]

Pierluigi Paganini May 16, 2014
Al-Qaeda is developing new Encryption tools in response to NSA surveillance

Recorded Future published a report to show that members of Al-Qaeda are developing a series of new encryption software in response to NSA surveillance. The revelation based on the document leaked by Edward Snowden on the NSA surveillance programs have had also a serious impact on the methods of terrorist organizations like Al-Qaeda. The information revealed […]

Pierluigi Paganini May 16, 2014
ECIPS INVITED TO HOLD DISCUSSIONS WITH INTERPOL

The ECIPS recently held discussions with INTERPOL in aim to assist the development of a global legal framework for Cyber Policing The European Centre for Information Policy and Security (ECIPS) recently held discussions with INTERPOL in aim to assist the development of a global legal framework for Cyber Policing. Some of the talks focused on the lack of the […]

Pierluigi Paganini May 16, 2014
DDoS Protection Services hacked to arrange powerful DNS DDoS attack

Security Experts at Incapsula have recently detected a powerful DNS DDoS attack organized by attackers abusing DDoS Protection Services servers. Experts at Incapsula have detected early this month a powerful DNS DDoS attack that was launched from high-capacity servers, but the alarming news is that the attackers have abused resources of two separate DDoS protection service […]

Pierluigi Paganini May 15, 2014
A new phishing scheme is being used to steal Google Account credentials

Security experts at Bitdefender discovered a new ingenious phishing scheme that is being used by hackers to steal Google Account credentials. Security experts at Bitdefender have discovered a news phishing scheme adopted by hackers to steal Google Account passwords. The new phishing attack is hard to catch with traditional heuristic detection, it mainly affects Google Chrome and […]

Pierluigi Paganini May 13, 2014
Ajax Security Team lead Iran-based hacking groups

FireEye published a report titled “Operation Saffron Rose” to document the activities of the Iranian hacking group named Ajax Security Team According to a recent report titled “Operation Saffron Rose” published by cybersecurity company FireEye, a group called the Ajax Security Team is the principal Iranian hacking group, it is responsible for different espionage campaigns on custom-built malicious software. “This group, which […]