Cyber Crime

Feds issue advisory on keylogger in hotel business centersFeds issue advisory on keylogger in hotel business centers

Feds issue advisory on keylogger in hotel business centers

US Secret Service and the NCCIC have alerted hoteliers about a potential presence of keyloggers in the machines provided to…

11 years ago
Chinese Executive charged of hacking on Boeing and other defense contractorsChinese Executive charged of hacking on Boeing and other defense contractors

Chinese Executive charged of hacking on Boeing and other defense contractors

Chinese Executive charged of Hacking on Boeing and other defense contractors to steal military data and advanced technologic projects. According…

11 years ago
Pitty Tiger – small ATPs scare private companiesPitty Tiger – small ATPs scare private companies

Pitty Tiger – small ATPs scare private companies

Security researchers at AIRBUS have uncovered a new APT, named Pitty Tiger, involved in a cyber espionage campaign which targeted…

11 years ago
NightHunter extensive data theft campaign has been active since 2009NightHunter extensive data theft campaign has been active since 2009

NightHunter extensive data theft campaign has been active since 2009

Experts from Cyphort Labs have discovered an extensive data theft campaign named Nighthunter that has been active since 2009 stealing…

11 years ago
GameOver Zeus Reloaded – a new improved version in the wildGameOver Zeus Reloaded – a new improved version in the wild

GameOver Zeus Reloaded – a new improved version in the wild

Experts from Malcovery Security have discovered that the Gameover Zeus botnet is reborn, a new improved version has emerged from…

11 years ago
Source code of Tinba banking malware leakedSource code of Tinba banking malware leaked

Source code of Tinba banking malware leaked

Security Experts at Danish CSIS Security Group have discovered that source code of Tinba banking trojan was published on an…

11 years ago
The Internet of Things and Cybercrime – what risks?The Internet of Things and Cybercrime – what risks?

The Internet of Things and Cybercrime – what risks?

Analysis of the compliance measures to be put in place in order to face data protection issues affecting the Internet…

11 years ago
Facebook dismantled Lecpetex botnet which infected 250,000 ComputersFacebook dismantled Lecpetex botnet which infected 250,000 Computers

Facebook dismantled Lecpetex botnet which infected 250,000 Computers

Facebook in a joint operation with the Greek Cyber Crime Division dismantled the Lecpetex botnet, which infected 250,000 Computers in…

11 years ago
Google blocked unauthorized digital certificates issued by NIC IndiaGoogle blocked unauthorized digital certificates issued by NIC India

Google blocked unauthorized digital certificates issued by NIC India

Google Security experts have detected and blocked unauthorized digital certificates for a number of its domains issued by the NIC…

11 years ago
Cisco warns on combined spear phishing and exploit attacksCisco warns on combined spear phishing and exploit attacks

Cisco warns on combined spear phishing and exploit attacks

Cisco's Threat Research Analysis and Communications (TRAC) uncovered an extremely targeted spear phish attack on high-profit companies in Europe. A…

11 years ago