search

Date range
Filters

1044 results

Pierluigi Paganini August 18, 2013
The Hackers Conference 2013 – Hackers will Demonstrate Digital Dangers

This is the second edition of ‘The Hackers Conference’. Following the huge success of the conference last year the current edition of the conference brings back to you all the knowledge, all the fun in a better, grander way! The Conference will be held in New Delhi, on the 25 of August 2013, and will […]

Pierluigi Paganini August 13, 2013
Android wallet apps vulnerability could allow currency theft

Bitcoin.org has released a security advisory related to a serious security flaw related to Android wallet apps that could allow money theft. Yesterday I’ve written on RAT for Android today we will speak of a weakness in some Android wallet apps for the popular mobile operating system that exposes Bitcoin users to risk of theft. […]

Pierluigi Paganini July 23, 2013
Researcher demonstrated SmartTV hacking on Samsung models

The researcher Malik Mesellem demonstrated that SmartTV hacking is a real menace, Samsung models could be forced to reboot sending an HTTP GET request It is known that smartTV hacking is a reality, these devices are connected to the Internet and suffers cyber threats exactly as any other device. Principal security firms predict a bleak future […]

Pierluigi Paganini June 30, 2013
Self-propagating ZeuS source code offered for sale in the underground

A new variant of Zeus trojan is offered for sale in the underground. It is a Self-propagating version that exploits Facebook, the RDP and the email. The criminal history taught us that after the diffusion of source code of malicious agent such as the popular Zeus it is possible to assist to a real explosion […]

Pierluigi Paganini June 09, 2013
Profiling the offer in criminal underground

Periodic analysis of the evolution of the offer in the underground criminal thanks to the efforts of experts such as Dancho Danchev. The offer of cyber criminals in the underground is very dynamic and articulated and its observation is a privileged point of view for better understand how evolve cyber threats. Recently we have spoken […]

Pierluigi Paganini June 01, 2013
Liberty Reserve suspension and impact on criminal underground

Private currency exchange system Liberty Reserve was shut down by US law enforcement, it is considered most popular payment system by cyber criminals. Liberty Reserve is a private currency exchange system issued by Liberty Reserve S.A. Of San José, Costa Rica that was shut down by US law enforcement with a deep impact on cybercriminal underground. The […]

Pierluigi Paganini May 14, 2013
New trends in the underground market, the offer of cybercrime

The monitoring of the criminal underground is essential to understand the dynamics of cybercrime and related offer on the black market. At fixed intervals I decided to take a look at what is happening in the underground black market analyzing how evolves its offer and the related sales models. In the last months it has been […]

Pierluigi Paganini May 11, 2013
Bank robbery. Global Network of cyber criminals stole $45m from ATMs

The biggest Bank robbery realized by a gang of hackers, a global network of cyber criminals operating in 26 countries stole $45 million hacking into a database of prepaid debit cards. The news on the biggest bank robbery with a cyber attack against ATMs in the history is conquering the Network, US law enforcement has […]

Pierluigi Paganini April 25, 2013
Public offer of Zeus FaaS service on social network

Public offer of Zeus FaaS service on Facebook My readers know very well the dynamic of cybercrime enterprise and in particular of the growing interest in monetization malicious codes such as malware, ransomware and more in general botnets. One of the most targeted sector is banking, the evolution of banking services, their introduction on mobile platforms made attractive targets for cyber criminals, one […]

Pierluigi Paganini April 25, 2013
Critical vulnerability in Viber exposes mobile user to serious risks

Critical vulnerability in Viber allow bypass security mechanisms We have discussed in various occasions of security in mobile environments, mobile device are becoming the center of our digital life, they act as a bridge between our daily existence and our identity in cyberspace. Mobile follows our movements, knows our habits and maintains a history of our interaction with our contacts, it’s clear that  compromising them […]