Cyber Crime

ICS-CERT MONITOR report states most critical infrastructure attacks involve APTs

DHS ICS-CERT MONITOR report reveals that most critical infrastructure attacks involve APTs, but organizations lack monitoring capabilities. The DHS’s Industrial…

11 years ago

TeslaCrypt ransomware encrypts also gaming data

TeslaCrypt is a new strain of ransomware, spotted in the wild by experts at Emsisoft, which is also targeting users…

11 years ago

US Government proposed an amendment to fight botnets

Obama Administration proposes giving courts more power to issue botnet injunctions, a measure necessary to fight the diffusion of malicious…

11 years ago

ECIPS – SKYPE HOSTS ID THEFT FAKE ACCOUNTS

European Centre for Information Policy and Security (ECIPS) reported identity thefts to Skype, but the company refused to take down…

11 years ago

Crooks use seemingly harmless help files to serve CryptoWall ransomware

Experts at Bitdefender revealed that crooks used seemingly harmless help files to distribute a variant of the popular ransomware CryptoWall.…

11 years ago

Spam campaign spreads Dridex Trojan via Macros in XML Files

Experts at Trustwave have discovered a spam campaign composed of several hundred messages trying to serve Dridex trojan though xml…

11 years ago

NCA, British National Crime Agency arrested a suspected Pentagon Hacker

British NCA has arrested a 23-year-old man suspected to be a member of the hacking crew that run the attack…

11 years ago

SIGA data breach exposed confidential data of 98000 US Military Personnel

Air Force Exchange Service (AAFES) confirms that following the SIGA data breach, confidential data belonging to US military personnel were…

11 years ago

Identity Fraud Cost US Consumers $16 billion in 2014, less than in 2013

The annual study published by Javelin Strategy & Research on identity fraud estimates that U.S. consumers actually suffered fewer losses…

11 years ago

Financial Trojans in 2014 – Symantec reports a significant drop in infections

Symantec revealed observed a significant drop in the number of  Financial Trojans in 2014, a report includes a detailed analysis…

11 years ago

This website uses cookies.