What could happen if a malware compromises a communication system adopted daily by 663 million users (info dated September 2011)? Security experts have spread an alert to Skype users about an ongoing attack that try to induce them to load a link that spreads malware. The famous voice-over-Internet application is totally changed from its original […]
In the last decade the role of hacker is deeply changed, these strange characters were once kept away from government affairs, but the scenario is reversed, there has been an unprecedented technological evolution and principal countries have discovered a new way of making war, a new way of spying. Today the hacker is the most […]
The news is circulating on internet creating great concern, once again Chinese hackers have hit an infrastructure of a foreign state, once again we are speaking of cyber espionage but this time the victim is excellent because they were able to access the White House Military Office. The Washington Free Beacon announced the cyber attack […]
It’s known that military sector represents a privileged incubator for new technologies than in many cases are subsequently used in civil. The mobile sector represents one of the most vulnerable environments due the lack of awareness on cyber threats and the increasing number of malware that are affecting devices devoid of any defense system. These […]
It’s happened again, cyber criminals have stolen digital certificates related to companies recognized reliable to sign malicious code. This time the victim is Adobe and according its security chief, Brad Arkin, a group of hackers have signed malware using Adobe digital certificate obtained compromising a vulnerable build server that was used to get code validation […]
Since last month a new campaign of cyber attacks have hit the Energy sector, all is started with the incidents to Saudi Aramco and RasGas companies, in both cases a malware infected internal networks without impacting on the production systems. Due the nature of the targets, the mode of attack and the specific malware behavior […]
Article published on Hakin9 IT Security Magazine “Raspberry Pi Hacking – Exploiting Software” 08/12 The article proposes an analysis of the main cyber threats that worry security experts and that are profoundly changing the cyber space. The exponential growth of the number of cyber threats and attacks is rebutted by a wide range of statistical […]
In these days it has been discussed about a possible Iranian cyber offensive against US banks immediately denied by government of Teheran, the event raised the discussion on the real level of security of banking systems. Financial institutions are considerable privileged targets for a cyber attacks, banking system is a critical asset for a nation […]
The tensions between Iran and Western countries are always in the principal news, the fear for an imminent Israel attack raises many questions regarding the real level of military preparedness of the regime. Many experts have tried to analyzed a possible scenario of the attack, in which the cyber component could assume a strategic importance. […]
In May Iranian Computer Emergency Response Team Coordination CenterLab, CrySyS Lab and Kaspersky Lab have published a news regarding a new malware that has been detected and that have hit mainly Windows systems of Middle East area, specifically the Iran. The malware was evidence of a huge ongoing cyber espionage campaign, the level of complexity […]