Cyber Crime

Pharming attacks exploit default passwords to hack routers

Experts at Proofpoint uncovered a pharming attack that uses phishing to exploit router vulnerabilities and carry out malicious activities. Security…

11 years ago

Joomla Reflection DDoS attacks exploit a Google Maps Plugin flaws

Akamai firm discovered numerous attacks exploiting a known vulnerability in a Google Maps plugin to run Joomla Reflection DDoS attacks…

11 years ago

The Europol and security giants dismantled the Ramnit botnet

The Ramnit botnet has been shut down in a joint effort by the Europol and the security firms Symantec, Microsoft,…

11 years ago

A $ 3million reward on kingpin behind the GameOver Zeus botnet

The US Justice Department offers $3 million reward for the arrest of GameOver ZeuS kingpin. The botnet was involved in…

11 years ago

A new strain of banking trojan VAWTRAK uses Macros and abuses Windows PowerShell

Security experts at TrendMicro observed significant improvements in VAWTRAK banking trojan which couples use malicious macros and Windows PowerShell. Early…

11 years ago

Lizard Squad run a DNS hijacking against the Google Vietnam website

Alleged Hacker belonging to the hacking crew Lizard Squad run a DNS hajacking attack against the Google Vietnam domain. A…

11 years ago

CyberCriminals and their APT and AVT Techniques

The cyber security expert Ashiq JA analyzed the principal characteristics of APT (Advanced Persistent Threat) and AVT (Advanced Volatile Threat)…

11 years ago

US State Department – Hackers still in the Email System

Three months from the incursion in the network of the U.S. State Department e-mail system, US specialists are still working…

11 years ago

Rule 41 – Google against the expansion of FBI hacking powers

The Us Justice Department's proposal to grant FBI Rule 41 specific hacking rights is under high scrutiny. While the amendment is…

11 years ago

Verisign report – The rise of DDoS attacks as a service

A new report published by Verisign provides useful data related to the recent evolution of DDoS attacks and the services…

11 years ago

This website uses cookies.