After Target and Neiman Marcus, also US retailer Michaels Stores confirms card data breach occurred early this year, the second one in the company hystory. Early this year was spread the news that Michaels Stores Inc, the biggest U.S. arts and crafts retailer, was the victim of a severe data breach. Michaels Stores Inc. retailer was […]
A new study conducted by the Ponemon Institute reveals the impact of successfully SQL injection attacks on organizations during the last year. The Ponemon Institute published a new study titled âThe SQL Injection Threat Studyâ to understand the reply of organizations to the SQL injection threat. The study is sponsored by DB Networks, its Chairman and CEO Brett Helm used the following […]
The demand for cyber security experts continues to raise, the US Government announced further investment to recruit new cyber talents with many difficulties. Cyber security is officially one of the first targets of every government, many countries announced huge investments to improve their cyber capabilities, a great effort that is having a significant impact on budgets and politics. […]
The German Aerospace Center was victim of a cyberespionage attack, many computers have been infected by sophisticated Trojans and other spyware. Cyber espionage is considerable today one of the most alarming cyber threats for governments and private industries, a growing number of attacks has the primary purpose to steal sensitive information like secret documents and […]
The APWG report 2H2013 seeks to understand trends and their significance by quantifying the scope of the global phishing problem. Last Anti-Phishing Working Group APWG report titled “Global Phishing Survey: Trends and Domain Name Use in 2H2013” confirms that threat of phishing has never been so high, the number of domains registered to conduct this kind of […]
Raoul Chiesa gives us his view on the current cyber threat landscape, from Snowden’s case to the links between cyber crime and state-sponsored hacking. Next week the forth Cybercrime Conference will be held in Rome (http://www.tecnaeditrice.com/eventi/cyber_crime_conference_2014/presentazione), two days in which top experts in the field will analyze high-profile cyber attacks discussing also about legal issues, privacy, and cyber strategies […]
Mandiant has released its annual M-Trends 2014 Threat Report, a document that analyzes actors, means and motivations behind attacks observed in 2013. Mandiant FireEye company has released a new detailed report titled “M-Trends 2014 Threat Report” describing actors, means and tactics behind principal attacks conducted in the recent months. The report consolidated data on principal cyber […]
According principal security firms, extortion, ransom and blackmail are pillars of illicit activities, cyber criminals are adapting them to the cyber context. Extrotion is becoming a worrying inclination in the cyber criminal ecosystem, the number of targeted attacks that request money in change of a suspension of the hostilities and to give back to the victims […]
Symantec has issued The Internet Security Threat Report, a document which provides an overview and analysis of global threat evolution in 2013. Security experts are observing a significant increase in the number of targeted cyber-attacks, it has been estimated that the growth is by 91 per cent in 2013 respect previous year, but most concerning […]
Security experts at Symantec observed a new phishing campaign based on a fake voting application used to steal victim’s credentials. Phishing is a very dangerous threat for Internet users, nearby classic techniques new forms of phishing are exploiting new platforms like mobile and social networks. Phishers continuously improve their techniques to be able to harvest […]