Security

Kaspersky reveals Kimsuky operation that is targeting South Korea

After months of investigation security researchers from Kaspersky have detected a new cyber espionage campaign dubbed Kimsuky that targeted South…

11 years ago

Group-IB Threat Intelligence Report 2012–2013 H1, a must read

Group-IB Threat Intelligence Report 2012–2013 H1 is an excellent analysis on the state and dynamics of today’s market of computer…

11 years ago

A look to Android offer in the underground mobile market

Security experts continues to observe the evolution of the offer of services and malicious software for fraudsters in the Android underground mobile…

11 years ago

Surveillance – NSA can access data on your mobile device

The German news agency Der Spiegel reported last act of US surveillance, the NSA is able to access data stored in a wide range…

11 years ago

Mevade botnet responsible for the spike in Tor traffic

Security researchers at Fox-IT firm found evidence that the spike in Tor traffic is caused by a Mevade botnet that hides its C&C in…

11 years ago

NSA Bullrun program, encryption and false perception of security

Revelations on Bullrun program demonstrated that NSA has capabilities against widely-used online protocols such as HTTPS and encryption standards. The…

11 years ago

Hesperbot, the new powerful banking trojan found by ESET

Hesperbot is the name of a new banking trojan detected by ESET, it is a very potent malware which includes some very advanced…

11 years ago

Man In The Browser attacks scare banking world

The majority of financial service professionals considers Man In The Browser as the greatest threat to online banking, cybercrime increases…

11 years ago

NetTraveler APT hackers still active improved their attacks

Experts at Kaspersky firm provided evidences that the hackers behind cyber espionage campaign NetTraveler are still active and improved their attack…

11 years ago

Traffic Correlation Attacks against Anonymity on Tor

The researchers led by Aaron Johnson of the Naval Research Laboratory published the paper on Traffic Correlation Attacks against Anonymity on Tor.…

11 years ago

This website uses cookies.