botnet

Cybercrime evolution in North America and Western EuropeCybercrime evolution in North America and Western Europe

Cybercrime evolution in North America and Western Europe

Despite cyber space is known as a domain without border an interesting study of the Kaspersky Security firm demonstrates that…

13 years ago
All you have to know on DDoS attack against GoDaddyAll you have to know on DDoS attack against GoDaddy

All you have to know on DDoS attack against GoDaddy

Yesterday was a terrible day, late afternoon in Europe Time, I noted that my blog Security Affairs, was down. I…

13 years ago
Dangerous waves of malware are transforming cyberspace in a jungleDangerous waves of malware are transforming cyberspace in a jungle

Dangerous waves of malware are transforming cyberspace in a jungle

The cyberspace is becoming a jungle of malware, a place where the danger is just around the corner. Governments, cyber…

13 years ago
DDoS attacks, so simple so dangerousDDoS attacks, so simple so dangerous

DDoS attacks, so simple so dangerous

Article Published on DDoS Attacks PT Extra 05_2012 The article proposes an analysis of DDoS attacks, explaining how the offensive technique…

13 years ago
Botnet around us, are we nodes of the Matrix?Botnet around us, are we nodes of the Matrix?

Botnet around us, are we nodes of the Matrix?

Article Published on The Hacker New Magazine – August Edition “Botnet” Introduction The nightmare of millions of infected computers synchronized to…

13 years ago
Malware & cyber espionage, ongoing attacks on sensitive informationMalware & cyber espionage, ongoing attacks on sensitive information

Malware & cyber espionage, ongoing attacks on sensitive information

Malware once were used primarily to destroy the victim's PC, but the scenario has completely changed today. While surviving the…

13 years ago
On new generation of P2P botnetsOn new generation of P2P botnets

On new generation of P2P botnets

Zeus is one of the longest-running malware that raged for months, appearing in various forms on the web thanks to…

13 years ago
The malware factoryThe malware factory

The malware factory

Article Published on The Hacker New Magazine – June Edition “Malware” With the term malware we refer a heterogeneous family of…

13 years ago
McAfee Report on alarming growth of cyber threatsMcAfee Report on alarming growth of cyber threats

McAfee Report on alarming growth of cyber threats

I find really interesting the report released by security firms regarding the principal cyber threats and the related evolution. This…

13 years ago
Flashback Trojan, a business opportunity for allFlashback Trojan, a business opportunity for all

Flashback Trojan, a business opportunity for all

Many people who do not work in our sector are asking me two questions with increasing frequency: Can a virus…

13 years ago