Malware

Social Network “in-security”

In recent years social networks have succeeded  in the historic feat of bringing to the web a growing number of users. Jupiter users, the elderly, individuals and businesses…

14 years ago

Trojan & Co, the new frontiers of espionage

Once upon a time the espionage made by agents who essentially lived in complete anonymity and free of the past were able to recover the greatest amount of information about…

14 years ago

Hacked MIT Server Used to Stage Attacks, Scan for Vulnerabilities

Bitdefender reseachers have discovered a number of brute force attacks against several web site. The attacks have been done using…

14 years ago

New variants of the DevilRobber Mac OS X TrojanFound in Trojaned Apps Are Stealing Data

Mac malware has been making some headlines in the last few months, as attackers have begun applying to OS X…

14 years ago

Malicious attacks on Facebook

Let me share with you the paper “A study of malicious attacks on Facebook” presented by Robert Sandilands during the…

14 years ago

Duqu Trojan, Stuxnet-derived malware

The Duqu trojan main purpose is to obtain a remote access allowing an adversary to gather information from a compromised…

14 years ago

Welcome on board

Welcome on board Welcome! If you are curious, interested in the subject and looking for a place with a few clicks you canbe updated on what happens in the world … well…

14 years ago

This website uses cookies.