Cyber Crime

Bitcoin case – How cybercriminals exploit typosquatting

How cyber criminals could exploit typosquatting? The case of MtGox proposed by MalwareBytes, a fake domain used to serve malicious…

12 years ago

The value of stolen card data that includes localization info

The hackers behind Target data breach are selling stolen card data including localization info. Why? In numerous posts I have…

12 years ago

Cybercriminal threatens to sell 3.7M Customers data Israeli Banks

A group of hackers has threatened Israeli banks to disclose stolen data belonging 3.7 million customers unless the organizations pay…

12 years ago

New cyber attack against The Washington Post

Security experts at Mandiant have discovered that hackers break into Washington Post servers stealing employee users credentials hashes. Security experts…

12 years ago

Target retailer investigating data breach involving 40M card accounts

US retailer Target is investigating a data breach potentially involving millions of customer credit and debit card data occurred during…

12 years ago

OPSEC novice … here the manual for perfect cyber criminals

Cyber security expert Dancho Danchev profiled a new OPSEC training services in the underground, a new trend that is converging…

12 years ago

ChewBacca, the last Tor-based banking trojan

Kaspersky Lab experts have discovered a new Tor-based banking trojan named "ChewBacca", it is the last malware exploiting Tor network.…

12 years ago

54 Million Turkish Citizens data stoled by Russian Hackers

Researchers from KONDA Security firm have discovered that the Russian hackers have stolen personal information of 54 Million Turkish Citizens.…

12 years ago

NSA – A bios malware can remotely destroy any US system

During a CBS Interview show "60 Minutes", The NSA Director General Alexander and the Information Assurance Director Plunkett  claimed a…

12 years ago

Advanced Power hits Firefox Users to conduct vulnerability scanning

KrebsOnSecurity has discovered an unusual botnet that disguises itself as a legitimate add-on for Mozilla Firefox to perform website vulnerability…

12 years ago

This website uses cookies.