Cyber Crime

Symantec on Network Time Protocol (NTP) reflection DDoS attacks

Security researchers at Symantec have spotted a series of Network Time Protocol (NTP) reflection DDoS attacks during the Christmas Holidays.…

12 years ago

Snapchat hack is reality, 4.6M usernames and Numbers exposed

Snapchat hack is reality, 4.6 million usernames and numbers exposed and publicly available on a specifically created domain SnapchatDB.info. Recently…

12 years ago

Cyber thieves are stealing money from ATMs with infected USB sticks

Two German researchers at the last Chaos Computing Congress in Hamburg revealed how cyber thieves steal money from ATMs win…

12 years ago

CDM MAGAZINE – CYBER WARNINGS DECEMBER 2013 ED. for free

CDM (CYBER DEFENSE MAGAZINE) PRESENTS: CYBER WARNINGS DECEMBER 2013 EDITION The December edition of the free Cyber Defense Magazine is…

12 years ago

Russian hacker HASH took control of a BBC server

The Russian hacker known as "HASH" and "Rev0lver" took control of a BBC server and attempted to sell access to…

12 years ago

Dexter Malware, the rise of malware that hits point of sales

Security experts at Arbor Networks have found a couple of servers used to arrange a malicious campaign against PoS with…

12 years ago

Bitcoin case – How cybercriminals exploit typosquatting

How cyber criminals could exploit typosquatting? The case of MtGox proposed by MalwareBytes, a fake domain used to serve malicious…

12 years ago

The value of stolen card data that includes localization info

The hackers behind Target data breach are selling stolen card data including localization info. Why? In numerous posts I have…

12 years ago

Cybercriminal threatens to sell 3.7M Customers data Israeli Banks

A group of hackers has threatened Israeli banks to disclose stolen data belonging 3.7 million customers unless the organizations pay…

12 years ago

New cyber attack against The Washington Post

Security experts at Mandiant have discovered that hackers break into Washington Post servers stealing employee users credentials hashes. Security experts…

12 years ago

This website uses cookies.