Just this morning I wrote in my article the ability of the Anonymous group that stands out in my assessment for the effectiveness of its operations. I tried to analyze the phenomenon, and I noticed that many colleagues tend to approach hacktivists ideology as a student movement, disorganized, and that can only be due to […]
The day has come, Network service providers are reporting the first IPV6 distributed denial-of-service (DDoS) attacks and the event is extremly significat from a secutity point of view. The news has been reported in the Arbor Networks’ 7th Annual Worldwide Infrastructure Security Report. Despite this king of attacks remain relatively rare, the news must alert […]
No doubts about the ability of the Anonymous group since the beginning years have intensified their activities demonstrating great technical skills. As always, the movement gives voice to social dissent and protest against amendments and decisions of governments guilty of not listening to the masses. Among the prominent victims group hacktivist there ‘s the FBI, […]
In recent years it has fully understood the offensive capability of the use of cyber weapons, highly efficient tools to move attacks and espionage operations in total coverage. The effectiveness of the cyber threat is linked not only to its intrinsic characteristics, but also to the choice of channel for its spread and in this […]
We are at an historical turning point today in U.S., and the situation is similar all over the world, threat of terrorist acts have been surpassed by cyber threats, this is the opinion of FBI Director Robert Mueller. Cyber crime, cyber-espionage, massive attacks, hacktivism, usage of cyber weapons against critical infrastructure are all phenomena that are increasing in frequency […]
The threat arrives via email, is now read consuetidine attacks that use email as a vector for spreading malware. Until now we have observed as typical scenario for the contagion an unsuspecting user that clicks on a link in the body of email that started the download of malware or that open the agent directly […]
Just yesterday I was impressed by a news published on a web site that announced that global cybersecurity market will reach reach quote $61 billion this year, according to a report by UK-based consultancy Visiongain, an impressive amount of money that give an idea of the business. Since now we have analyzed the grows of […]
As previously said the cyber crime industry is proving to be invoiced in a thriving company that knows no crisis. The reasons are countless, high profits and unpunished crimes most often the main reasons. What amazes is, however, the organization managing the criminal business. Operations managed as projects and malware designed as products of large […]
Koobface virus is undoubtedly considered as the malware of social network because it uses them as spread channel. We have repeatedly mentioned the incredible power of social networking media, platforms that reach a global audience with a simple click, obvious that such a capability could be attractive to criminal organizations for the spread of malware. […]
Do you remember the case of Symantec and the theft of the source code of some of its products by an Indian group of hackers called the lord of Dharmaraja? On that occasion it was declared by Symantec officials that the source code of its products had been stolen in a successful attack to the […]