botnet

Prolexic Q3 2012 … a new generation of DDoS attacksProlexic Q3 2012 … a new generation of DDoS attacks

Prolexic Q3 2012 … a new generation of DDoS attacks

The second half of 2012 is started with an sensible increase of Distributed denial-of-service attacks against financial institutions and banking…

13 years ago
What is the Dorkbot worm that is attacking Skype’s users?What is the Dorkbot worm that is attacking Skype’s users?

What is the Dorkbot worm that is attacking Skype’s users?

What could happen if a malware compromises a communication system adopted daily by 663 million users (info dated September 2011)?…

13 years ago
Are they Islamic hacktivists? In the meantime Netanyahu draws a red lineAre they Islamic hacktivists? In the meantime Netanyahu draws a red line

Are they Islamic hacktivists? In the meantime Netanyahu draws a red line

Last Wednesday the web site of U.S. Bank has been hit by a DDoS attack, that caused its block, launched…

13 years ago
Malware,Botnet & cyber threats,what is happening to the cyberspace?Malware,Botnet & cyber threats,what is happening to the cyberspace?

Malware,Botnet & cyber threats,what is happening to the cyberspace?

Article published on Hakin9 IT Security Magazine "Raspberry Pi Hacking – Exploiting Software" 08/12 The article proposes an analysis of…

13 years ago
Eset on Flashback malware, interesting info to prevent further attacksEset on Flashback malware, interesting info to prevent further attacks

Eset on Flashback malware, interesting info to prevent further attacks

Reports from main security firms confirm the increasing growth of cyber attacks based on malware, in particular the large diffusion…

13 years ago
Analisys on Flame C&C, the cyber war began long agoAnalisys on Flame C&C, the cyber war began long ago

Analisys on Flame C&C, the cyber war began long ago

In May Iranian Computer Emergency Response Team Coordination CenterLab,  CrySyS Lab and Kaspersky Lab have published a news regarding a…

13 years ago
The good and the bad of the Deep WebThe good and the bad of the Deep Web

The good and the bad of the Deep Web

  Article Published on The Hacker New Magazine – September Edition “Security in a serious way” Introduction The Deep Web (or…

13 years ago
Microsoft distrupts Nitol botnet, malware hidden in supply chainMicrosoft distrupts Nitol botnet, malware hidden in supply chain

Microsoft distrupts Nitol botnet, malware hidden in supply chain

The malware diffusion is assuming dimension difficult to control, no matter if we are facing with a state-sponsored attack or…

13 years ago
Botnet, pro & cons of using Tor NetworksBotnet, pro & cons of using Tor Networks

Botnet, pro & cons of using Tor Networks

As declared several time Deep Web, thanks to the anonymity of its connection, provides to cyber criminals an ideal environment…

13 years ago
Cybercrime evolution in North America and Western EuropeCybercrime evolution in North America and Western Europe

Cybercrime evolution in North America and Western Europe

Despite cyber space is known as a domain without border an interesting study of the Kaspersky Security firm demonstrates that…

13 years ago