Cyber Crime

Unflod Baby Panda, the Chinese malware hit jailbroken iphone

Unflod Baby Panda is the name of a new mobile malware which is targeting jailbroken versions of Apple iPhone. The…

12 years ago

US retailer Michaels Stores confirms card data breach

After Target and Neiman Marcus, also US retailer Michaels Stores confirms card data breach occurred early this year, the second…

12 years ago

Ponemon study – SQL Injection attacks too dangerous for organizations

A new study conducted by the Ponemon Institute reveals the impact of successfully SQL injection attacks on organizations during the…

12 years ago

Cyber warriors fought between the government and the security industry

The demand for cyber security experts continues to raise, the US Government announced further investment to recruit new cyber talents…

12 years ago

German Aerospace Center hit by serious malware-based attack

The German Aerospace Center was victim of a cyberespionage attack, many computers have been infected by sophisticated Trojans and other…

12 years ago

APWG report 2H2013- Analysis of phishing phenomena on global scale

The APWG report 2H2013 seeks to understand trends and their significance by quantifying the scope of the global phishing problem.…

12 years ago

Raoul Chiesa – from cybercrime to state-sponsored hacking

Raoul Chiesa gives us his view on the current cyber threat landscape, from Snowden's case to the links between cyber crime and…

12 years ago

Reading the Mandiant M-Trends 2014 Threat Report

Mandiant has released its annual M-Trends 2014 Threat Report, a document that analyzes actors, means and motivations behind attacks observed…

12 years ago

The Extortion is a common practice in the cyber criminal ecosystem

According principal security firms, extortion, ransom and blackmail are pillars of illicit activities, cyber criminals are adapting them to the…

12 years ago

Symantec Internet Security Threat Report on evolution of cyber menaces

Symantec has issued The Internet Security Threat Report, a document which provides an overview and analysis of global threat evolution…

12 years ago

This website uses cookies.