Cyber Crime

PlaceRaider the 3D visual malware from military research

It's known that military sector represents a privileged incubator for new technologies than in many cases are subsequently used in…

13 years ago

Malware,Botnet & cyber threats,what is happening to the cyberspace?

Article published on Hakin9 IT Security Magazine "Raspberry Pi Hacking – Exploiting Software" 08/12 The article proposes an analysis of…

13 years ago

Expected new wave of cyber attacks against banking

In these days it has been discussed about a possible Iranian cyber offensive against US banks immediately denied by government…

13 years ago

Eset on Flashback malware, interesting info to prevent further attacks

Reports from main security firms confirm the increasing growth of cyber attacks based on malware, in particular the large diffusion…

13 years ago

The good and the bad of the Deep Web

  Article Published on The Hacker New Magazine – September Edition “Security in a serious way” Introduction The Deep Web (or…

13 years ago

Microsoft distrupts Nitol botnet, malware hidden in supply chain

The malware diffusion is assuming dimension difficult to control, no matter if we are facing with a state-sponsored attack or…

13 years ago

Botnet, pro & cons of using Tor Networks

As declared several time Deep Web, thanks to the anonymity of its connection, provides to cyber criminals an ideal environment…

13 years ago

Cybercrime evolution in North America and Western Europe

Despite cyber space is known as a domain without border an interesting study of the Kaspersky Security firm demonstrates that…

13 years ago

All you have to know on DDoS attack against GoDaddy

Yesterday was a terrible day, late afternoon in Europe Time, I noted that my blog Security Affairs, was down. I…

13 years ago

Dangerous waves of malware are transforming cyberspace in a jungle

The cyberspace is becoming a jungle of malware, a place where the danger is just around the corner. Governments, cyber…

13 years ago

This website uses cookies.