FireEye report on the evolution of sophisticated cyber threats and their diffusion on global scale FireEye security firm has published another interesting report, titled “FireEye report -The Advanced Cyber Attack Landscape”, that provides an overview of advanced cyber attack landscape, these events are a widespread global activity and during 2012. FireEye experts detected  12 million malware communications seeking instructions, […]
Critical vulnerability in Viber allow bypass security mechanisms We have discussed in various occasions of security in mobile environments, mobile device are becoming the center of our digital life, they act as a bridge between our daily existence and our identity in cyberspace. Mobile follows our movements, knows our habits and maintains a history of our interaction with our contacts, itâs clear that  compromising them […]
Recently hackers have intensified the number of attacks against corporate social media accounts, the Twitter account is most targeted ones due the high interest of businesses in this comfortable communication channel. Various the companies that have recently been hacked on Twitter including 60 Minutes, 48 Hours and a Denver news affiliate, The New York Times, […]
Verizon has issued the â2013 Data Breach Investigations Reportâ that investigates on a series of documented data breaches. Verizonâs RISK Team, in collaboration with other 18 partners, has issued the â2013 Data Breach Investigations Reportâ that investigates on a series of documented data breaches. Since 2008 the company yearly publishes data related to principal incidents occurred during […]
In the last months of 2012 a group of hackers known as âIzz ad-Din al-Qassam Cyber Fightersâ conducted a series of attacks against principal banking and financial institutions including the U.S. Bancorp, JPMorgan Chase&co, Bank of America, PNC Financial Fervices Group, and SunTrust Banks. Security experts noted that the hackers adopted an anomalous strategy for the […]
When the HTTP protocol was born in 1999, no one ever thought it will be used by one of the most dangerous Cyber threats called Botnet. A bot is an application that can perform and repeat a particular task faster than a human. When a large number of bots infect different targets (e.g. Computers and […]
Security worldwide community is alarmed by the explosion of number of cyber threats that are becoming even more sophisticated and are exploring new channel to infect a larger number of machines for various purposes, from cyber espionage to the realization of complex fraud. Antivirus company AVG has published an interesting study on games hacks that […]
Cyber espionage is considerable as  one of the most aggressive and dangerous cyber threats, its silent operation could steal sensitive information, company secrets and intellectual properties for a long time. Recently many cyber espionage campaigns have been discovered, last in order of time is the Winnti campaign but we cannot forted also Red October and […]
Any owner of WordPress site is shaking causes of the threat that someone could steal its credentials, everybody would do well to ask themselves if their passwords are really strong and to make sure to donât use as username the word âadmin.â The reports published by CloudFlare and HostGator revealed a massive attack being launched against WordPress blogs […]
The number of cyber attacks is increased in an impressive way, cyber criminals, hacktivists, independent and state-sponsored hackers are daily operating in cyberspace conducting more or less dangerous offensive. Everyone is exposed to concrete risks of cyber attacks, internet users, private business and government offices, thatâs why is fundamental to have a clear idea on […]