search

Date range
Filters

1036 results

Pierluigi Paganini December 11, 2014
Mac OS X is no longer immune, reveals Kaspersky’s 2014 Malware countdown

Apple’s Mac OS X is no longer immune to malware and bugs says Kaspersky Security Lab.A survey of 2014 reveals that more malware attacks targeted Mac. For years, Mac OS X has been flaunted as the most immune OS to malwares and bugs. Well, the reign of Mac might end in 2014, with users’ on […]

Pierluigi Paganini December 06, 2014
Treasury Dept report confirms Tor network abuse in financial crimes

A non-public report realized by the US Treasury Department found that a majority of bank account takeovers exploits the anonymizing the Tor network. A report from the U.S. Treasury Department found that a majority of bank account takeovers by cyber criminals, affected organizations over the past decade, exploited the anonymizing Tor network. The news is shared by the […]

Pierluigi Paganini November 26, 2014
Evolution of Black Markets after operation Onymous

The Digital Citizens Alliance Security provided data related to the growth of dark markets like Evolution after the operation Onymous operated by police. Recently law enforcement in a joint effort against cybercrime, dubbed operation Onymous, seized dozens of black markets on Tor Networks. While all the the underground marketplaces in the DeepWeb, including Silk Road 2.0, went […]

Pierluigi Paganini November 24, 2014
How hackers are exploiting vulnerable DVRs to conduct illegal activities

Security experts discovered a new malware that targets DVR and other Internet of Things devices recruiting them for different illegal activities. DVR, abbreviation for Digital Video Recorders systems, from Hikvision firm are affected by vulnerabilities that allow an attacker to hack them remotely. Digital Video Recorders are systems used to record surveillance footage of office buildings and […]

Pierluigi Paganini November 14, 2014
How Operation Onymous managed by law enforcement impacted Tor network

What is changed after the law enforcement conducted the takedown of several illegal marketplaces as part of the Operation Onymous? The recent shutdown of several black market places in the Tor network, including the popular SilkRoad 2.0, has captured the attention of media of the extension of illegal activities in the part of the web […]

Pierluigi Paganini November 07, 2014
Operation Onymous, the joint attack against dark markets in Tor

Operation Onymous – Law enforcement and judicial agencies around the globe conducted a joint action against dark markets on Tor networks. This morning I have reported the news of the seizure for the underground black market Silk Road 2.0 and the arrest of its alleged manager, Defcon” Benthall. In reality, the shutdown of Silk Road 2.0 is […]

Pierluigi Paganini November 07, 2014
FBI arrested Blake “Defcon” Benthall and seized Silk Road 2.0

Silk Road 2.0 shut down by the FBI that arrested Blake “Defcon” Benthall, alleged operator of the underground black market specialized in the sale of drugs. The FBI announced the arrest of Blake Benthall, also known as “Defcon,” the alleged owner and operator of black market Silk Road 2.0, Ars that is following the case […]

Pierluigi Paganini October 30, 2014
Voxis, the platform for automating rogue credit card charges is available in the underground

A group of cybercriminals is proposing in the underground an application for automating rogue credit card charges dubbed Voxis platform. The cyber criminal ecosystem has a new tool in its arsenal called Voxis, the Voxis Platform is a payment gateway application which can send batches of stolen card charges to multiple gateway processors automating their returns before acquiring banks […]

Pierluigi Paganini October 20, 2014
Phishing campaign via Dropbox exploits SSL of the popular cloud service

Experts at Symantec have detected a scam based on Dropbox accounts to serve phishing pages over secure communication channels. Recently a massive data leakage has interested DropBox, a week ago a guest account post on Pastebin four different documents, all claiming to be part of “the massive hack of 7,000,000 accounts”. The author also anticipated that there are “More to […]

Pierluigi Paganini October 18, 2014
Analyzing the HIGH-TECH CRIME TRENDS 2014 Report

Group-IB published the annual HIGH-TECH CRIME TRENDS 2014 Report, a document focused on high-tech crimes associated with traditional computer crime. Group-IB, a leading company in cybercrime prevention and investigations, has issued its annual report titled “GROUP-IB REPORT: HIGH-TECH CRIME TRENDS 2014″ which cover the second half of 2013 and the first half of 2014. The report is one of […]