search

Date range
Filters

1198 results

Pierluigi Paganini February 24, 2015
Experts discovered other applications using the same Superfish Komodia library

Experts at Facebook have discovered at least ten more applications using the Komodia library that allows Superfish adware traffic hijacking capabilities. Matt Richard security researcher from Facebook revealed that The Social Network has discovered at least ten more software applications using the Komodia library that allow Superfish adware traffic hijacking capabilities. Komodia installs a self-signed […]

Pierluigi Paganini February 23, 2015
CyberCriminals and their APT and AVT Techniques

The cyber security expert Ashiq JA analyzed the principal characteristics of APT (Advanced Persistent Threat) and AVT (Advanced Volatile Threat) . Cybercriminals and their techniques in the APT and AVT attacks “APT is an attack in the persistent memory that resides in the victims machine without getting noticed and the attacker exfiltrates sensitive information from […]

Pierluigi Paganini February 23, 2015
US Government Has Developed a Manhattan Project for Cyber Attacks, Rather than For Defensive Purposes

A cyber Manhattan Project seems to have been on the move for over a decade, providing the US with a great advantage related to online surveillance. Despite belief, no defensive purposes have triggered its setting up. Everybody recalls the notorious Manhattan Project at the end of World War II, which has resulted in the development […]

Pierluigi Paganini February 20, 2015
The Future of Data Security: DNA Cryptography and Cryptosystems

DNA Cryptography can be defined as a hiding data in terms of DNA Sequence. Why DNA Cryptography and which are the principal benefits for its adoption? DNA Computing Information Security is very vital in today’s digital era of e-commerce and e-business. While 2014 was “The Year of Data Breach”, 2015 is off to a fast […]

Pierluigi Paganini February 18, 2015
Is Bio hacking a security risk? The future is now!

Bio hacking – technology and humans have never been so close, they complement each other. But what are the security and privacy risks? IS BIOHACKING A SECURITY RISK? Imagine a world where our day to day activities like door locking, supermarket purchases, credit card swipes and smartphone usage are replaced by just one chip embedded […]

Pierluigi Paganini February 17, 2015
How attackers use phishing kits for their campaigns

How cyber criminals use several phishing kits to run malicious campaigns and which is the economy behind this category of attacks? Most of the major banks and companies that suffer this type of attacks make people aware of phishing, but despite the high level of awareness of the threat, the phenomenon does not slow down, indeed seems to accelerate […]

Pierluigi Paganini February 17, 2015
The Equation Group shows most complex and sophisticated hacking techniques ever seen

Experts at Kaspersky Lab revealed that the capabilities of the Equation Group Surpass anything known in terms of sophistication of hacking techniques. Security experts at Kaspersky revealed the existence of a hacking group operating since 2001 that targeted practically every industry with  sophisticated zero-day malware. According to a new report from Kaspersky Lab, this group, dubbed […]

Pierluigi Paganini February 16, 2015
New Studies Proving Non Immediate Reaction of Antivirus Tools to Threats

It has been outlined that most antivirus software do not detect all the malware and other threats that they should, leaving room for infection and motivating companies to look deeper for more effective solutions to the problem of online security. The safety of an internet user against a threat of a virus infection is analogous […]

Pierluigi Paganini February 11, 2015
US Government Launching New Cyber Threat Intelligence Integration Center

US government is launching the Cyber Threat Intelligence Integration Center for the co-ordination of all other departments and improving of cybersecurity. US government will create a new center which is going to co-ordinate all the other units that work towards providing a more effective defence against cybercrime. The new center will fill the gaps that […]

Pierluigi Paganini February 09, 2015
Cybercrime exploits Anthem data breach in Phishing campaigns

Following the Anthem data breach, cyber criminals launched phishing campaigns to harvest customers’ personal information and credentials. A few hours after disclosure of the news of the data breach suffered by the nation’s second largest health insurer Anthem cyber criminals started sending phishing emails related to the cyber attacks. The Anthem incident could potentially impact millions […]