Cloud

SERT Q4 2013 Threat Intelligence Report on threat landscape evolutionSERT Q4 2013 Threat Intelligence Report on threat landscape evolution

SERT Q4 2013 Threat Intelligence Report on threat landscape evolution

Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape. Recently…

11 years ago
LinkedIn – Surge of fake profiles and increment of illicit activitiesLinkedIn – Surge of fake profiles and increment of illicit activities

LinkedIn – Surge of fake profiles and increment of illicit activities

LinkedIn company filed a complaint in San Francisco against unknown hackers responsible for the creation of an impressive amount of…

11 years ago
Cyberespionage – Chinese Hackers targeting US Cloud service providersCyberespionage – Chinese Hackers targeting US Cloud service providers

Cyberespionage – Chinese Hackers targeting US Cloud service providers

U.S.-China Economic and Security Review Commission reported for the first time that cloud computing “represents a potential espionage threat.” U.S.-China…

12 years ago
DDoS Mitigation – Choosing a Cloud-based solutionDDoS Mitigation – Choosing a Cloud-based solution

DDoS Mitigation – Choosing a Cloud-based solution

An introduction of DDoS mitigation techniques focused on Cloud-based DDoS Mitigation solution, an approach implemented by many companies. Despite their…

12 years ago
iCloud two-factor protection, security flaw or deliberate choice?iCloud two-factor protection, security flaw or deliberate choice?

iCloud two-factor protection, security flaw or deliberate choice?

iCloud could not properly protect the user’s data despite the implementation of a two-factor protection. Millions of users access to…

12 years ago
Sophos Security Threat Report 2013, today … tomorrowSophos Security Threat Report 2013, today … tomorrow

Sophos Security Threat Report 2013, today … tomorrow

Sophos was one of the first security firms that has published a report, Sophos Security Threat Report 2013, on current…

13 years ago
Buying Time with Cloud-based Server Monitoring SolutionsBuying Time with Cloud-based Server Monitoring Solutions

Buying Time with Cloud-based Server Monitoring Solutions

System administrators are extremely busy people, so they will be very pleased to know that cloud-based server monitoring solutions can…

13 years ago
Google used as cyber weapon. New attack method foundGoogle used as cyber weapon. New attack method found

Google used as cyber weapon. New attack method found

True, sometimes the big discoveries are the daughters of the case. That's what happened to Panos Ipeirotis, a researcher of…

13 years ago

Banking sector under attack, are we ready to the challenge?

Where can I find money? At the bank of course, this is the thought which underlies dell'orietamento of cyber crime…

13 years ago

How much cost malware production? Which are the processes for the production of virus? (Part.2)

Here I am, as promised, to continue the research started together regarding the cost of malware. Reading news of more…

14 years ago