search

Date range
Filters

1044 results

Pierluigi Paganini March 29, 2015
Security Affairs newsletter Round 2 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Just a unicode string of 13 characters to crash Mac Chrome tab Chrome, Firefox, Safari and IE – All Browsers Hacked at Pwn2Own Competition PoSeidon the most sophisticated PoS […]

Pierluigi Paganini March 18, 2015
Admins of the EVOLUTION Black market exit scamming

The Evolution Black Market, the most popular an online black marketplace appears to have vanished, it seems that admins of the website exit scamming. The security community is paying attention to the evolution of dark markets following the operation Onymous conducted by law enforcement in November. Law enforcement in a joint effort against cybercrime seized dozens of black […]

Pierluigi Paganini March 15, 2015
TeslaCrypt ransomware encrypts also gaming data

TeslaCrypt is a new strain of ransomware, spotted in the wild by experts at Emsisoft, which is also targeting users of principal gaming platforms. A new strain of ransomware dubber TeslaCrypt was spotted in the wild by the researchers at the security firm Emsisoft. TeslaCrypt was discovered at the end of February, researchers at Bromium that analyzed the […]

Pierluigi Paganini March 14, 2015
A new EU counter-terrorism unit will tackle extremists online

The Eu plans for a new European counter-terrorism unit that  will tackle extremists online in a joint effort of law enforcement from various states. Terrorists are exploiting the web for propaganda purpose and to menace the Western infidels for this reason intelligence agencies and law enforcement need to increase their efforts to tackle any kind of extremist […]

Pierluigi Paganini March 09, 2015
FBI investigating apparent ISIS defacements on Western websites

A number of Western websites were hacked over the weekend, the sites were defaced with messages claiming the ISIS as the responsible. The FBI is investigating a series of cyber attacks occurred over the weekend on several western websites, the authorities suspect the involvement of hackers linked to the ISIS. The list of hacked websites includes […]

Pierluigi Paganini March 09, 2015
Digital Shadows firm develops a search engine for the Deep Web

Security firm Digital Shadows has realized a search engine for the Deep Web that according the company CEO “sucks in pages in real time”. The deep web is the part of the world wide web not indexed by common search engines, it represents almost all of the content available on the Internet. Law enforcement, intelligence […]

Pierluigi Paganini February 27, 2015
Cyber criminals target trading algorithms to steal related code

Security firms discovered a significant increase in the number of targeted attacks aimed at stealing the code related trading algorithms. Cyber criminal organizations appear more interested in target trading algorithms, patents, trade secrets than other kinds of information, this is the new trend observed by security experts. Cyber criminals are increasing their activity against private […]

Pierluigi Paganini February 25, 2015
McAfee Labs Threat Report – many mobile apps still vulnerable

The McAfee Labs Threat Report: February 2015 analyzes security level of mobile apps and the evolution of principal cyber threats. Last year the Carnegie Mellon University’s Computer Emergency Response Team (CERT) analyzed the level of security implemented by Android applications, in particular the experts focused their investigation on Android applications that failed to properly validate SSL certificates. The […]

Pierluigi Paganini February 19, 2015
Lenovo sold laptop with pre-installed Superfish malware

The Lenovo computer company knowingly shipped laptops with pre-installed Superfish malware. And ‘controversy on the web, users are outraged. Lenovo is in the storm one again, security experts discovered that the company is shipping laptops with Superfish malware , a malware that allows to steal web traffic using man-in-the-middle attacks. SuperFish is considered by many antivirus companies as […]

Pierluigi Paganini February 17, 2015
How attackers use phishing kits for their campaigns

How cyber criminals use several phishing kits to run malicious campaigns and which is the economy behind this category of attacks? Most of the major banks and companies that suffer this type of attacks make people aware of phishing, but despite the high level of awareness of the threat, the phenomenon does not slow down, indeed seems to accelerate […]