Cyber Crime

Cybercrime-as-a-Service, the rise of hacking services

Security expert Dancho Danchev profiled one of the numerous hacking services offered in the underground highlighting new trends in the…

13 years ago

Android malware uses Google Cloud Messaging Service as C&C Server

Security experts at Kaspersky have detected numerous Android malicious applications that uses Google Cloud Messaging Service as C&C. Android malware exploits the Google Cloud Messaging…

13 years ago

Android wallet apps vulnerability could allow currency theft

Bitcoin.org has released a security advisory related to a serious security flaw related to Android wallet apps that could allow…

13 years ago

AndroRAT drives the rise for DIY Android hacking tools

AndroRAT is just one of the numerous open-source tools that was created and published on the undergroud forums to allow…

13 years ago

DNS impairment redirects thousands of websites to malware

Cybercriminals are exploiting the possibility of DNS impairment to redirects visitors of thousands legitimate websites to compromised domains used to serve…

13 years ago

Fort Disco botnet compromised more than 6000 websites

Researchers at Arbor Networks discovered a botnet called Fort Disco that was used to compromise more than 6000 websites based on…

13 years ago

Firefox Zero-day exploited against Tor anonymity

Security researchers found a malicious script that takes advantage of a Firefox Zero-day to identify some users of the Tor anonymity…

13 years ago

FBI Android malware used for investigations

Former FBI officers revealed to the Wall Street Journal the existence of FBI Android malware that is used to spy…

13 years ago

Q2 2013 Superfecta report, constant increase for automated attacks

FireHost Secure cloud hosting company issued Q2 2013 Superfecta report that revealed a sharp increase in blended, automated attacks. FireHost announced the…

13 years ago

Uncovered an unusual attacks based on anomalous file infector

Security experts uncovered an unusual cyber espionage campaign based on file infector belonging to the PE_EXPIRO family that includes information theft…

13 years ago

This website uses cookies.