Cyber Crime

Thieves are using commercial drones for burglaries

Law enforcement warns thieves are using the mini-helicopters and commercial drones to carry out reconnaissance on homes to burgle. Security…

11 years ago

Ransomware Removal Kit available online for free

A security researcher has compiled the Ransomware Removal kit that could be used in the process of responding to ransomware…

11 years ago

Malicious version of PuTTY is spreading in the wild

Bad actors have released a malicious version of the popular open source tool PuTTY to steal access credentials of computers…

11 years ago

CareFirst data breach affects about 1.1M people

CareFirst BlueCross BlueShield fall victim of a major data breach, personal information belonging more than one million individuals could have…

11 years ago

Rombertik destroys the MBR to prevent unauthorized use of the malware

According to the experts at Symantec, the Rombertik malware attempts to destroy the MBR to prevent unauthorized use of the…

11 years ago

The Naikon APT, one of the most active APTs in Asia

Experts at Kaspersky Lab published an interesting report on the activities of the Naikon APT revealing details on their infrastructures…

11 years ago

New Intel Security study shows that 97% of people can’t identify phishing emails

Intel Security published an a curious study to test consumer knowledge about phishing practice and measure the ability to detect…

11 years ago

Expo 2015 – Anonymous has stolen 1TB data from Best Union ticketing service

The Anonymous collective continues the wave of cyber attacks against the Expo 2015 Universal Exposition, the last victim in order…

11 years ago

ISIS – Cyber Caliphate hackers are threatening Electronic War

Pro-Isis Hackers belonging to Cyber Caliphate hacking team threaten ‘Electronic War’ on US and Europe. Which are ISIS cyber capabilities?…

11 years ago

Security Affairs newsletter Round 9 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

11 years ago

This website uses cookies.