Cyber Crime

2012 Norton Cybercrime report, a worrying scenario

Here we are with the regular appointment with Symantec and its report on cybercrime " The yearly Norton Cybercrime report",…

13 years ago

Large-scale monitoring, few hours to identify file-sharers

We have often discussed the fact that governments and intelligence agencies regularly use tools to spy on communications and navigation…

13 years ago

AntiSec steals 1M Apple UDID from FBI notebook with an exploit

Another blow was dealt to the authorities by a group of hackers linked to Anonymous that claims to have breached…

13 years ago

Social Networks Part 3 – Are you exposing yourself unnecessarily to physical threats?

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins In our first article we…

13 years ago

Crisis malware threatens the virtualized environments

This is an hot summer under the malware perspective, we have spoken of new malware for cyber espionage and of…

14 years ago

New raise of Citadel malware…banking again under attack

The FBI has launched an alert titled "Citadel Malware Continues to Deliver Reveton Ransomware in Attempts to Extort Money "…

14 years ago

Botnet around us, are we nodes of the Matrix?

Article Published on The Hacker New Magazine – August Edition “Botnet” Introduction The nightmare of millions of infected computers synchronized to…

14 years ago

Traveling the Silk Road, study of the famous market places

Yes Guys, when we think to the deep web the media tell us only about its dark side, it's considered…

14 years ago

Anonymous Ethical code. Back to the origins

Several months ago I wrote on the future of the famous group of hacktivism, Anonymous explaining that the model the…

14 years ago

Phishing the financial and banking seas

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martins, David Pace and Benjamin Gittins Every day the international…

14 years ago

This website uses cookies.