botnet

DDoS attacks, so simple so dangerous

Article Published on DDoS Attacks PT Extra 05_2012 The article proposes an analysis of DDoS attacks, explaining how the offensive technique…

13 years ago

Botnet around us, are we nodes of the Matrix?

Article Published on The Hacker New Magazine – August Edition “Botnet” Introduction The nightmare of millions of infected computers synchronized to…

13 years ago

Malware & cyber espionage, ongoing attacks on sensitive information

Malware once were used primarily to destroy the victim's PC, but the scenario has completely changed today. While surviving the…

13 years ago

On new generation of P2P botnets

Zeus is one of the longest-running malware that raged for months, appearing in various forms on the web thanks to…

13 years ago

The malware factory

Article Published on The Hacker New Magazine – June Edition “Malware” With the term malware we refer a heterogeneous family of…

13 years ago

McAfee Report on alarming growth of cyber threats

I find really interesting the report released by security firms regarding the principal cyber threats and the related evolution. This…

14 years ago

Flashback Trojan, a business opportunity for all

Many people who do not work in our sector are asking me two questions with increasing frequency: Can a virus…

14 years ago

Flashback? Are you joking? There aren’t malware for Mac

Yesterday I discussed with a friend and colleague Francesco on the lack of awareness of Apple's users on malware that…

14 years ago

DDoS, detailed analysis of the phenomenon

Last year we have observer an impressive grow of distributed denial-of-service (DDoS) attacks mainly related to operation arranged by group…

14 years ago

Botnets and cyber warfare, a dangerous combination

The US Government is very close to the theme of warfare being among the countries that invest more in the…

14 years ago

This website uses cookies.