Money motivates the cyber assault to banking by cybercrime, but the finance world is also considered a privileged target for sponsored-state attacks as part of cyber offense strategies. Let’s consider that the banking world is profoundly changing, the introduction of mobile devices, social networks, the openess to web services, the coming of new technologies such […]
Zeus is one of the longest-running malware that raged for months, appearing in various forms on the web thanks to the continuous changes made by the cybercrime industry. This time the news is really interesting, Symantec security researchers have detected a new variant of Zeus that not relies on command and control (C&C) servers for […]
Article Published on The Hacker New Magazine – June Edition “Malware” With the term malware we refer a heterogeneous family of malicious software designed with the purpose to disrupt computer operation, gather sensitive information, or gain unauthorized access to victims systems. With the term we indicate in fact several types of malicious code such as computer […]
Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 05 2012. The article offers an overview on cyber security issues relating to sports events, competitions that are a priority target for terrorists and cyber criminals. What weight has the information security component on the overall organization? An analysis of the main types of computer attacks and possible consequences in a highly critical contest such as a sporting event. Introduction Whenever we see a major sporting event we […]
Again Anonymous, again another hack in the name of freedom and against the censorship, this time the famous Anonymous have attacked the Mahanagar Telephone Nigam Limited (MTNL), bringing down its web site because the company is responsible of internet monitoring and censoring. The group posted on their website the following message ”We are against Internet […]
According to a post of Eric Grosse, VP of security engineering at Google, on Google Online Security blog the company is constantly monitoring the web for malicious activity on its systems, with particular attention to attacks made by third parties to illegally access into users’ accounts. Google declared that is ready to adopt measurements to mitigate […]
Article published on The Malta Indipendent The last years have been characterised by the escalation of operations conducted by hacktivist groups, such as the famous Anonymous, which have expressed social dissent through cyber attacks. In contemporary society technology plays a crucial role, and is used as a new cultural vehicle and even aggregation element. It’s a […]
What is happening to Anonymous? His media energy seems to be at risk addiction just when major security firm are beginning to consider it as one of the most dangerous cyber threat. The feeling that comes from outside is that the group of hacktivist is slowly falling apart, the feeling is that within the group are mixed stirring souls. Some groups are more aware on […]
We have discussed several times regarding the intention of the FBI to create a special unit for internet monitoring and surveillance, a task force established to prevent and fight cyber crimes .In reality the Bureau already has different internal units that work with the same purpose and in the last years has promoted different projects […]
The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported by normal search engines. According several researches the principal search engines index only a small portion of the overall web content, the remaining part is unknown to the majority of web users. What do you […]