Cyber Crime

Malware & cyber espionage, ongoing attacks on sensitive information

Malware once were used primarily to destroy the victim's PC, but the scenario has completely changed today. While surviving the…

14 years ago

DDoS attacks in Q2, do not underestimate the cyber threat

In the first quarter I proposed the results of an analysis conducted by Prolexic firm on the incidence of DDoS…

14 years ago

UK cyber strategy discussed in ISC report 2011/2012

The elaboration of a proper cyber strategy is one the main target of intelligence services all around the world. We…

14 years ago

Government cyber strategies to mitigate growing cyber threats

In the last decade we have observed the raise of cyber attacks, no matter their purpose, cyber warfare or cyber…

14 years ago

The raise of Multi-platform malware

The malware factory still evolving, every day security firms detect new cyber threats that show new sophisticated techniques to avoid…

14 years ago

Anonymous #OpPedoChat pros and cons of a noble battle

The hacktivists of Anonymous are always on and always operating despite many experts continue to downplay the importance and effectiveness…

14 years ago

A view on the economic impact of cyber attacks, from US to China

On June 28th, a FBI official declared before a House panel that the phenomenon of cyber espionage is increasing with…

14 years ago

Who really takes advantage of the operations of Anonymous?

I desire to tribute another article to the group that catch the  worldwide attention of security community, Anonymous. Few years…

14 years ago

Citadel trojan, migration of cybercrime to the deep web

We all remember the Citadel trojan, based on  the Zeus experience has evolved becoming one of the most interesting cyber…

14 years ago

Capfire4, malware-as-a-service platform for crime

It’s not first time we discuss of cybercrime and in particular of its organizational models, creative servicex offer any kind…

14 years ago

This website uses cookies.