Cyber warfare

The cyber capabilities of Iran can hit USThe cyber capabilities of Iran can hit US

The cyber capabilities of Iran can hit US

A study titled “Iran:How a Third Tier Cyber Power Can Still Threaten the United States" states that Iran has sufficient…

12 years ago
Credit Card Redirection, the evolution of phishingCredit Card Redirection, the evolution of phishing

Credit Card Redirection, the evolution of phishing

Researchers at Securi discover Credit Card Redirection attack technique to hijack credit card data during transactions on e-commerce sites. With…

12 years ago
Hackers hit South Korea also spread spyware to steal military secretsHackers hit South Korea also spread spyware to steal military secrets

Hackers hit South Korea also spread spyware to steal military secrets

Mc Afee Lab experts revealed that hackers behind large scale cyberattacks against South Korea also designed malware to steal military…

12 years ago
Watering hole attacks and exploit kits – Indian gov site caseWatering hole attacks and exploit kits – Indian gov site case

Watering hole attacks and exploit kits – Indian gov site case

Number of Watering hole attacks is increasing, most of them based on well known exploit kits. The case of compromised…

12 years ago
New wave of cyber attacks from Iran hit USNew wave of cyber attacks from Iran hit US

New wave of cyber attacks from Iran hit US

New cyber attacks from Iran hit US enterprises focusing on energy sector, the offensive has been revealed by American officials…

12 years ago
Zero-day market, the governments are the main buyersZero-day market, the governments are the main buyers

Zero-day market, the governments are the main buyers

Governments, and in particular US one, are principal buyers of zero-day vulnerabilities according a report published by Reuters. Zero-days exploits…

12 years ago
China vs US mutual accusations, the cyber cold war is begunChina vs US mutual accusations, the cyber cold war is begun

China vs US mutual accusations, the cyber cold war is begun

China and US governments continue to exchange accusations about the continuing incursions into the respective national networks. China and US…

12 years ago
Verizon, large scale cyber espionage from China and much moreVerizon, large scale cyber espionage from China and much more

Verizon, large scale cyber espionage from China and much more

Verizon has issued the “2013 Data Breach Investigations Report” that investigates on a series of documented data breaches. Verizon’s RISK Team,…

12 years ago
US army discloses budget for cyber operationsUS army discloses budget for cyber operations

US army discloses budget for cyber operations

It’s not a mystery, every state despite the spending review on the military budget is continuing to reserve consistent investment in cyber…

12 years ago
Anonymous #OpIsrael, use of botnets & hypothesis on attackersAnonymous #OpIsrael, use of botnets & hypothesis on attackers

Anonymous #OpIsrael, use of botnets & hypothesis on attackers

We all remember the debated attacks of Anonymous collective against Israeli government that targeted various websites of the country last…

12 years ago