1044 results
Police officers from dozen countries have just completed the first training program on Darknets, Tor hidden services and illegal marketplaces. Cybercrime becomes even more sophisticated and explores new technologies for its illegal activities. A growing problem for law enforcement agencies world worldwide is to track illegal activities in the Dark Web. Not only cyber criminals, but also groups […]
Let’s explain what makes the new Bitphone VoIP service, a perfect tool to perform some social engineering calls. Bitphone is a new VoIP service, a perfect tool to perform some social engineering calls, but why? Bitphone is like a Payphone, the only difference is that in this case you need to pay it with bitcoins […]
Researchers have spotted a new strain of the Bartalex macro-based malware that is used to drop the Pony loader malware and the popular Dyre banking Trojan. Bartalex is a macro-based malware that was first discovered earlier this year, security researchers have spotted a new strain of this malicious code dropping the Pony loader malware and the popular Dyre banking […]
Thi post was written by the security experts and colleagues at RedSocks, they explored the argument of the “Attribution” for the Hacking Team data Breach. Attribution is probably one of the toughest things to deal with during a major Cyber Security breach, yet it is one of the most demanded skills.Earlier in the first incident […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. A new Zero-Day Vulnerability arises from Hacking Team hack Hacking Team Another Flash Zero-Day: CVE-2015-5122 Hacking Team by Numbers – The Infographic Hacking Team chief: Were the GOOD GUYS […]
Researchers at Kaspersky Lab have discovered a new strain of TeslaCrypt ransomware, version 2.0, which was improved in a significant way. Malware researchers at Kaspersky detected a new strain of the TeslaCrypt ransomware (Trojan-Ransom.Win32.Bitman.tk), so-called TeslaCrypt 2.0, which includes a number of improvements. This ransomware also encrypts video game files, but the most significant improvement […]
Morpho is the name of a financially motivated espionage group that targets large enterprises, including Microsoft, Apple, Twitter, and Facebook. Security experts have discovered and analyzed the activities of a financially motivated APT group, dubbed Morpho and Wild Neutron, that has targeted a large number of high profile companies worldwide. According to the analysis published by […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Password Recovery Scam – how to hack a Gmail account Signal amplification and brute-force attack for car thieves Electronic Frontier Foundation – WhatsApp ranked as the worst at protecting […]
Security experts at Trend Micro published a report on the Deep Web and related illegal activities that exploit the darknets it contains. Experts at TrendMicro published an interesting report on the Deep Web focusing their analysis on the services and products available in the dark part of the internet that is not indexed by the principal search […]
Between April 2014 and June 2015, the IC3 received 992 CryptoWall related complaints, with victims reporting losses totaling over $18 million. Cryptowall is one of the most nefarious ransomware in the wild, in twelve months the FBI has estimated that the overall losses were more than $18 million. Ransomware implements a classic extortion scheme typically demanding that victims pay ransom […]