Cyber Crime

Pierluigi Paganini May 25, 2015
Who and why is attacking companies in the Nordic Countries?

Security experts at FireEye have published a report that details the cyber threats targeting various sectors in the Nordic countries. According to FireEye, threat actors targeted strategic industries (i.e. aerospace and defense, energy, health and pharmaceuticals, and shipping), government and defense agencies searching for political, economic and military intelligence. Experts believe sophisticated threat groups could be […]

Pierluigi Paganini May 24, 2015
Hi-tech car thieves use £30 jamming devices in car parks

Hi-tech car thieves use £30 jamming devices in car parks, the devices allow them to bypass car coding and reprogramme vehicles before driving off in them. Car thieves are becoming even more technological, we have read many news regarding hackers that designed specific solutions to hack car through the internal CAN bus or simply to unlock car doors […]

Pierluigi Paganini May 24, 2015
Security Affairs newsletter Round 10 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Chinese hackers hit Penn State University, 18K people impacted ISIS – Cyber Caliphate hackers are threatening Electronic War Use privacy software if you want to be safe from Facebook, […]

Pierluigi Paganini May 24, 2015
The Phantom Menace, who targeted the oil tankers?

Panda Security firm released a report regarding a hacking campaign dubbed “Operation Oil Tanker: The Phantom Menace” that targeted oil tankers. Security researchers at Panda Security have released a report on a hacking campaign dubbed “Operation Oil Tanker: The Phantom Menace” that targeted oil tankers. According to Panda Security the attacks on oil cargos began in August […]

Pierluigi Paganini May 23, 2015
Adult FriendFinder dating site hack exposes million users

Cyber criminals have hacked the popular online dating websites Adult FriendFinder leaking the highly sensitive sexual information on a forum in the dark web. The popular dating website Adult FriendFinder was hacked, it suffered a massive data breach that potentially exposed personal details of nearly 4 Million users. According to Channel 4 News, the information was offered […]

Pierluigi Paganini May 22, 2015
Thieves are using commercial drones for burglaries

Law enforcement warns thieves are using the mini-helicopters and commercial drones to carry out reconnaissance on homes to burgle. Security and privacy issued related to the use of drones must be carefully addressed in order to avoid dangerous effects due to their diffusion, there are several ways to abuse of such complex and powerful machines […]

Pierluigi Paganini May 22, 2015
Ransomware Removal Kit available online for free

A security researcher has compiled the Ransomware Removal kit that could be used in the process of responding to ransomware infections. CryptoLocker, CoinVault, and TeslaCrypt are the names of some of the most dreaded ransomware that infected million of users worldwide. The extortion is a very common practice in the cyber criminal underground and ransomware are […]

Pierluigi Paganini May 21, 2015
Malicious version of PuTTY is spreading in the wild

Bad actors have released a malicious version of the popular open source tool PuTTY to steal access credentials of computers worldwide. Be careful, there is an unofficial version of Putty in the wild and it seals information. This version was compiled from the legitimate source, but isn’t hosted on the official website project, instead, attackers redirect […]

Pierluigi Paganini May 21, 2015
CareFirst data breach affects about 1.1M people

CareFirst BlueCross BlueShield fall victim of a major data breach, personal information belonging more than one million individuals could have been exposed. Health insurer CareFirst BlueCross BlueShield is notifying more than one million individuals that it was the victim of a data breach which may have exposed personal information used by attackers to gain limited, […]

Pierluigi Paganini May 19, 2015
Rombertik destroys the MBR to prevent unauthorized use of the malware

According to the experts at Symantec, the Rombertik malware attempts to destroy the MBR to prevent unauthorized use of the Trojan. Early this month, the experts at Cisco have published a report on the Rombertik, a high sophisticated strain of malware that wipes hard drive to prevent analysis. According to Symantec, Rombertik is a new […]