Fortinet company, the worldwide provider of network security appliances and a market leader in unified threat management (UTM), has recently published the report âFortinet 2013 Cybercrime Reportâ that deepens the phenomenon of cybercrime. The report highlights that cybercrime is assuming an amazing relevance, what really surprise is its organizational capacity that has nothing to envy […]
CNET web site has published a news on a secret National Security Agency program named Perfect Citizen that is targeting on large-scale the control systems inside utilities, including power grid and gas pipeline controllers, with the purpose to discover security vulnerabilities. The program was revealed by new documents from EPIC (the Electronic Privacy Information Center), the […]
During 2009 it was revealed that one of the primary defense contractor BAE Systems was hacked causing the exposure of sensible information on F-35 fighter jet. The reserved information were obtained by a group of hackers who accessed to internal server of the contractor, but BAE Systems admitted it only in 2012. The attackers were […]
The news was a bolt from the blue, the confidentiality of our data is at risk, Russian company Elcomsoft has announced that its software tool Elcomsoft Forensic Disk Decryptor is able to decrypt encryption containers created with  TrueCrypt, PGP and BitLocker To Go. These software are considered the most common and reliable tools used by […]
Just one week ago a UN treaty was approved to update 24-year-old United Nations telecommunications rules. The agreement states that countries have the right to access international telecommunications services and control them to prevent cybercrimes such as spamming. The downside is that the UN treaty could open the doors to attitudes of censorship of governments […]
On December 16th the Iranian Maher center issued an advisory warning of a new “targeted data wiping” malware discovered during an investigation. First analysis of the center revealed that the malicious code has a simple as efficient design that allow it to wipe files on different drives in various predefined times. The malware wipes disk partitions […]
Last summer a series of cyber attacks hit energy sector, one of the worldâs largest oil companies the Saudi Aramco was attacked by a group named the Cutting Sword of Justice. Hackers used the Shamoon malware to attack the systems of the company, fortunately, production environment wasn’t impacted. The malware is able to wipe files from […]
During the last week introduced you the excellent work done by the Group-IB, a security firm resident of the Moscow-based Skolkovo Foundation that has received a grant in the amount of 30m rubles (approximately $966,000) for the development of a global counter-cybercrime system named the CyberCop. It was for me the opportunity to receive many interesting […]
Cyber espionage is worldwide recognized one of the most concerning cyber threats mainly operated by governments to steal sensible information to foreign states and private companies. FireEye has revealed a cyber espionage campaign, named “Sanny“, attributable to Korea that hosts command-and-control (C&C) servers used in the attacks, the C&C channel is embedded on a legitimate page […]
Social networks are platforms that have monopolized majority of userâs internet experience, the imperative is to âsocialâ, and everybody share an incredible amount of personal information exposing its digital identity to serious risks. An element of attraction for cyber criminals is the huge number of services, from gaming to payments, that are developing on these […]