The author of the Blackhole exploits kit has been arrested after a long investigation. What will change in the offer of the criminal underground? The author of the popular Blackhole exploit kit, also know as Paunch, has been arrested. The cybercrime underground has lost one of its principal actors considering that the malicious kit is one of […]
Symantec issued 2013 Norton Report, the annual research study which examines the consumers’ online behaviors, the dangers and financial cost of cybercrime. Symantec has released the 2013 Norton Report, the annual study of evolution of principal cyber threats in the security landscape. The study presented concerning results on the constant growth of cyber criminal activities. The 2013 […]
What is an E-shop for iFramed traffic and how does cybercrime exploit it? In this post thanks to the investigation of the incredible Dancho Danchev I’ll try to answer to these questions. On numerous occasion I remarked the need to carefully observe the evolution of the underground market to identify dangerous trends that can leave portend a new wave of […]
IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a detailed analysis of current security landscape, including data on main cyber threats and information on mitigation techniques. IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a study that identifies Social media as the main target of cyber criminal activities. The powerful social networking […]
Adobe reveals customer data stolen in security breach, hackers have accessed sensitive information for 2.9 million users and to the source code of many products. Adobe Systems Inc has warned that customer data stolen in a security breach. According an official advisory, 2.9 million customers might have had their information stolen due a cyber attack that hit […]
FBI seizes underground drug market Silk Road and identified its owner. The site was producing earning for more than $1.2 billion in business. The FBI has closed the popular black market Silk Road after many years of investigation, the website hosted in the Tor Network was seized by US law enforcement. Last year a research made by the Carnegie Mellon […]
IT security firm F-Secure has published its Threat Report H1 2013, the document proposes a focus on Java exploits, mobile threats, Bitcoin mining, APTs and Mac malware. F-Secure security firm has released the Threat Report H1 2013 that provides an overview on cyber security landscape analyzing the events that characterized the first part of the year. The primary cause of incidents according the […]
An identity theft service that sells personal information on millions of US citizens has been hacked. Millions of US citizens exposed to Id Theft. Around 5 Millions of Americans are exposed to the concrete risk of identity theft, this is one of most clamorous and grotesque case of data breach, hackers stolen data on US citizens that were stored in the […]
Kaspersky Lab discovered the emerging group of cyber-mercenaries Icefog available for hire to perform surgical hit and run operations against strategic targets. Researchers at Kaspersky Lab sustain to have identifies a group of cyber mercenaries called Icefog that is responsible for a huge cyber espionage campaign, occurred in 2011, against Japanese parliament and dozens of government agencies and […]
Thousands of WordPress based websites have been hacked to compose a global scale botnet that is performing powerful DDOS attacks. I start the post with recommendations, if you are a blogger using WordPress don’t waste time and update it and all installed plugins to the latest versions! Have you done it? OK, now I can explain you what it is […]