Cyber Crime

NIT, the Flash code the FBI used to deanonymize pedo’s on Tor

A look to the "NIT Forensic and Reverse Engineering Report, Continued from January 2015". NIT code was used by the FBI…

11 years ago

Dino Malware that targeting Iran belong to Animal Farm’s arsenal

Researchers at ESET analyzed the Dino malware confirming that the sophisticated espionage platform belongs to the arsenal of the Animal…

11 years ago

OPM suspends e-QIP to patch a severe security flaw

The OPM announced that it has temporarily suspended its Electronic Questionnaires for Investigations Processing (e-QIP) system to fix a security…

11 years ago

Cyber espionage – Russia and China are targeting British Companies and Others

Ongoing incidents have brought to light the power of both Russia and China in the field of cyber espionage. Their…

11 years ago

Hacked Routers exploited to serve the Dyre banking trojan

Researchers at the Fujitsu Security Operations Center spotted a strain of Dyre being served exploiting hundreds of compromised home routers.…

11 years ago

Europol coordinated a joint operation against airline fraudsters in 49 countries

On 16 and 17 June the Europol coordinated an international law enforcement operation against airline fraudsters at 140 airports across…

11 years ago

Magnitude exploit kit now include also the CVE-2015-3113

The French researcher Kafeine confirmed that the author of the Magnitude exploit kit have added the code to exploit the…

11 years ago

Experts found Government Credentials on the Open Web too easily

Recorded Future discovered that credentials stolen in a number of breaches and belonging to government agencies are available online on…

11 years ago

Popular travel websites warn Customers of Phishing scam

The customers of popular travel websites are targeted by phishing scam in an attempt to lure them into disclosing personal…

11 years ago

Security Affairs newsletter Round 15 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

11 years ago

This website uses cookies.