backdoor

RARSTONE, TrendMicro revealed Naikon cyberespionage campaign

RARSTONE is the name of the RAT (REMOTE ACCESS TOOL) used in a cyber espionage campaign dubbed "Naikon" uncovered by…

13 years ago

The offensive approach to cybersecurity, motivations and risks

Cybersecurity goes to the offensive, law enforcement and private companies are discussing the possibility to adopt an offensive approach to…

13 years ago

Apple decrypts seized iPhones for law enforcement

Apple can "bypass the security software" if it chooses, accoring ATF no law enforcement agency could unlock a defendant's iPhone except…

13 years ago

Sophisticated Apache backdoor serving Blackhole exploit kit detected

Securi security firm detected a new sophisticated  Apache backdoor used to hijack traffic  to malicious website serving the popular Blackhole exploit kit.…

13 years ago

Nokia and the accusation of MITM attack

The charge is heavy, according to some experts, Nokia analyzes user’s traffic officially to increase performance compressing data on some…

13 years ago

Iran and India, control and monitoring of networks

The news is circulating for days, the Iranian head of the national security forces , Esmail Ahmadi Moghadam, declared that…

13 years ago

Malware hides C&C server communications using Google Docs function

The ways explored by malware creators are unlimited, recently Symantec has announced the discovery of a new operational mode for…

13 years ago

Flame, miniFlame, the mystery of an on going cyber espionage campaign

Last May The Iranian Computer Emergency Response Team (MAHER) detected a new targeted malware which hit the country, that has been…

13 years ago

Microsoft distrupts Nitol botnet, malware hidden in supply chain

The malware diffusion is assuming dimension difficult to control, no matter if we are facing with a state-sponsored attack or…

13 years ago

DaVinci code,the surveillance business & eligibility of investigations

No doubts, one of the most advanced cyber threat to the technological evolution is the malware diffusion, we read daily…

14 years ago

This website uses cookies.