Cyber Crime

Chinese criminal underground is doubled between 2012 and 2013

Expert at TrendMicro published a new chapter of the Cybercriminal Underground Economy Series in which analyzed the Chinese underground. Chinese…

11 years ago

The rapid growth of the Darknet black markets

The Digital Citizen's Alliance provided an updating to the study which analyzes online black markets, focusing on the sales of…

11 years ago

IptabLes and IptabLex botnet targeting Linux servers to run large-scale DDoS attacks

Experts at Akamai-Prolexic discovered a botnet dubbed IptabLes and IptabLex that infects and exploits poorly-maintained Linux servers to run DDoS…

11 years ago

AlienVault discovered Watering Hole attacks using Scanbox for reconnaissance

Security experts at AlienVault discovered a series of watering hole attacks using the Scanbox reconnaissance Framework that is targeting several…

11 years ago

Analyze VirusTotal Metadata to profile hackers

An independent researcher has analyzed for years the metadata on submissions to VirusTotal service identifying patterns related to many bad…

11 years ago

Brazilian cyber criminals targeting home routers

Experts at Kaspersky spotted an interesting attack from Brazilian criminals that try to change the DNS settings of home routers…

11 years ago

Hacking traffic light systems

In this article published on the Infosec Institute are analyzed the principal studies on the security of traffic light systems…

11 years ago

Namecheap accounts compromised using the CyberVor’s archive

Hosting provider Namecheap warned its customers that hackers compromised some of its users' accounts using the CyberVor's archive of credentials.…

11 years ago

Bogus cellphone towers found in the US

CryptoPhone 500 security firm has found 17 bogus cellphone towers in the US with a heavily customized handset exploited for…

11 years ago

Alleged iCloud flaw exploited in Naked celebrity hack

Investigation on celebrities naked pictures leaked online raises suspicion that hackers breached iCloud accounts exploiting a flaw in the "Find…

11 years ago

This website uses cookies.