Cyber Crime

A virus specialized for AutoCAD, a perfect cyber espionage tool

In recent years we are assisting to a profoundly change in the nature of malware, it is increased the development…

14 years ago

Wikiboat against the Pentagon, risks on Anonymous evolution

We live in the cyber era, governments measure their capabilities in the cyberspace with reciprocal attacks of increasing complexity.Every government…

14 years ago

Malware and new sophisticated cyber techniques against banking

Money motivates the cyber assault to banking by cybercrime, but the finance world is also considered a privileged target for…

14 years ago

On new generation of P2P botnets

Zeus is one of the longest-running malware that raged for months, appearing in various forms on the web thanks to…

14 years ago

The malware factory

Article Published on The Hacker New Magazine – June Edition “Malware” With the term malware we refer a heterogeneous family of…

14 years ago

Cyber security during sporting events

Excerpt from the article published on the last edition of PenTest AUDITING & STANDARDS 05 2012.  The article offers an overview on cyber security issues relating to sports…

14 years ago

Anonymous, #OPIndia against censorship

Again Anonymous, again another hack in the name of freedom and against the censorship, this time the famous Anonymous have…

14 years ago

Google Online Security against state-sponsored attacks

According to a post of Eric Grosse, VP of security engineering at Google, on Google Online Security blog the company is…

14 years ago

The hacktivism phenomenon

Article published on The Malta Indipendent The last years have been characterised by the escalation of operations conducted by hacktivist groups,…

14 years ago

Wake up Anonymous, the world is getting used to you!

What is happening to Anonymous? His media energy seems to be at risk addiction just when major security firm are beginning to consider it as one of the most…

14 years ago

This website uses cookies.