Botnets

DDoS attacks in Q2, do not underestimate the cyber threat

In the first quarter I proposed the results of an analysis conducted by Prolexic firm on the incidence of DDoS…

12 years ago

Government cyber strategies to mitigate growing cyber threats

In the last decade we have observed the raise of cyber attacks, no matter their purpose, cyber warfare or cyber…

12 years ago

Citadel trojan, migration of cybercrime to the deep web

We all remember the Citadel trojan, based on  the Zeus experience has evolved becoming one of the most interesting cyber…

12 years ago

Capfire4, malware-as-a-service platform for crime

It’s not first time we discuss of cybercrime and in particular of its organizational models, creative servicex offer any kind…

12 years ago

Malware and new sophisticated cyber techniques against banking

Money motivates the cyber assault to banking by cybercrime, but the finance world is also considered a privileged target for…

12 years ago

Increasing concerns on cyber warfare capabilities of the North Korea

According to the news published on Korea JoongAng Daily website, North Korea cyber army has been tracked attempting cyber attacks…

12 years ago

Flashback Trojan, a business opportunity for all

Many people who do not work in our sector are asking me two questions with increasing frequency: Can a virus…

12 years ago

DNSChanger , much ado about nothing and the wrong choice

 Summary of previous episodes In beginning of the year a news circulated on internet regarding the planned blackout of Internet…

12 years ago

Russian cybercrime, not only a localized threat

Several times I wrote on cybercrime trying to analyze a phenomenon that grows with an impressive rhythm. The trend is…

12 years ago

Cyber threats in mobile environment

Today I desire to share with you the results of a study of Trend Micro security firm focused on mobile…

12 years ago

This website uses cookies.