The security researchers at Sucuri firm discovered a malicious code that could be used to steal payment card data from Magento platform. Security experts at Sucuri have uncovered a new method used by criminals to syphon payment card data from websites based on the Magento e-commerce Platform. Researchers explained that attackers can collect any data submitted […]
Security experts at Trend Micro published a report on the Deep Web and related illegal activities that exploit the darknets it contains. Experts at TrendMicro published an interesting report on the Deep Web focusing their analysis on the services and products available in the dark part of the internet that is not indexed by the principal search […]
Swedish Co-Creator Of Blackshades RAT was sentenced by the US authorities to 57 months in prison. Another success of the law enforcement against cybercrime. A New York federal court sentenced Alex Yücel (a.k.a. “marjinz“), a Swedish man, who is the alleged mastermind behind the BlackShades Remote Access Tool (RAT). BlackShades is a popular RAT in the […]
Altcoin cloud mining hash power online marketplace ScryptCC has been hacked and a large amount of Bitcoin was stolen by the attacker. The news of another clamorous case of Bitcoin theft is circulating on the Internet, Altcoin cloud mining hash power online marketplace ScryptCC has been hacked. In time I’m writing it is not known […]
What is the Dark Web? Unveiling the myth of the Dark Web and making sure that people understand its magnitude and its limitations. Let’s begin by explaining what the so called “Dark Web” actually is. This is a term used to describe a collection of websites that may be publicly visible, but they hide information […]
A recent wave of car burglaries raises the debate on possible hacking techniques adopted by car thieves .. Signal amplification and brute-force attacks. A few months ago the journalist Nick Bilton wrote about his car being broken into in front of him. Bilton believes that his car was stolen by using snatched with the help of a signal […]
Security experts at Symantec are warning about a new password recovery scam targeting Gmail users worldwide mainly for intelligence gathering. Every day scammers propose new techniques to steal personal information and other sensitive data. Today we will speak of a new social engineering technique used in the wild by crooks that allow them to hack into […]
This post is an excerpt from the article titled “Evolution of 3D Printing Technology Raises Security Concerns” available on the Infosec Institute. Also known as the term additive manufacturing (AM), 3D printing is a process for making a three-dimensional object of almost any shape starting from a 3D model or other electronic data source. Through […]
Trustwave firm published a report related to 2014 incidents that revealed cyber criminal activities are paying with 1,425% return on investment. Hackers are seeing a whopping 1,425% return on investment for these two kinds of attacks Security experts at Trustwave published an interesting report on the return on investment related to illegal activities online. The experts revealed that […]
A brief introduction to several malware-related terms in an easy-to-understand manner. A useful glossary to better understand the “malware” terminology. Introduction The world that we live in is constantly changing; it is always evolving. The sophistication of the technology at the disposal of both those who “wear” a white hat (the good guys) and those who wear a black hat (the bad guys) […]