Cyber Crime

No good news from ENISA Threat Landscape Mid year 2013

ENISA Threat Landscape Mid year 2013 presents top cyber threats, anticipating its interim Threat Landscape 2013 report. The study reveals…

12 years ago

Africa – Cybercrime has turned the web as a hub of evil

Africa is becoming even more an "online continent" despite its economical difficulties, in the same time there is a growing…

12 years ago

Hacking – Give me 10 minutes to hack the Nasdaq

It is very easy to hack the Nasdaq according the security expert Kolochenko that reported numerous vulnerabilities in the official…

12 years ago

FBI admitted attack against the Freedom Hosting

In an Irish court the FBI Supervisory Special Agent Donahue revealed that FBI had control of the Freedom Hosting company…

12 years ago

Android Firefox Zero-Day exploit available on the underground

A researcher at Malwarebytes has discovered that a Russian hacker recently released an Android Firefox Zero-Day exploits on the underground.…

12 years ago

Cybercrime: Africa need a defense
 system

Africa ’s banking industry, tourism sector and plenty of other businesses are prone to cyber-related crime hence the urgent need…

12 years ago

PHP SuperGlobal variables gaining popularity within hacking community

Imperva security researchers observed Web attacks involving PHP SuperGlobal variables are gaining popularity within the hacking community. Security researchers sounded the…

12 years ago

Kaspersky reveals Kimsuky operation that is targeting South Korea

After months of investigation security researchers from Kaspersky have detected a new cyber espionage campaign dubbed Kimsuky that targeted South…

12 years ago

Group-IB Threat Intelligence Report 2012–2013 H1, a must read

Group-IB Threat Intelligence Report 2012–2013 H1 is an excellent analysis on the state and dynamics of today’s market of computer…

12 years ago

A look to Android offer in the underground mobile market

Security experts continues to observe the evolution of the offer of services and malicious software for fraudsters in the Android underground mobile…

12 years ago

This website uses cookies.