The cyberspace is becoming a jungle of malware, a place where the danger is just around the corner. Governments, cyber criminals, hacktivist and terrorist are focusing their activities in the new domain due this reason we are assisting to the born of new agents and very sophisticated attack tools. In a parallel manner is lowering […]
Here we are with the regular appointment with Symantec and its report on cybercrime ” The yearly Norton Cybercrime report“, a document that analyzes the evolution of cyber criminal activities and their impact on the society. The report covers different technologies including and social networking and mobile reporting the impact on final customers in economic terms. […]
The security firm FireEye has released an interesting report named “Advanced Threat Report” related first half of 2012 that provides an overview of the current threat landscape, evolving advanced malware and advanced persistent threat (APT) tactics, and the level of infiltration seen in organizations’ networks today. The report presents and alarming scenario, the organizations are […]
Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins In our first article we talked about the intentional or unintentional disclosure of personal information in social networks that can expose you to logical (computer-based) threats and we gave you some recommendations about how to properly manage this risk of […]
Article Published on DDoS Attacks PT Extra 05_2012 The article proposes an analysis of DDoS attacks, explaining how the offensive technique is used in several contexts to hit strategic targets for different purposes. The discussion is supported with the statistics provided by the principal security firms that provide solutions to protect infrastructures from this kind of […]
This is an hot summer under the malware perspective, we have spoken of new malware for cyber espionage and of new fraud schemas based on malicious software diffusion. Many experts use to avoid malware diffusion making risky navigation and operations in a Virtual environment, a paradigm that is having a great diffusion in the last […]
Last week it has been registered a serious cyber attack against one of the world’s largest energy companies, the Saudi Aramco, and a group named the Arab Youth Group has claimed responsibility for the event. The group posted a message on Pastebin, declaring that the attack has been carried out to protest against the Saudi […]
Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins “Be social” is the buzzword of recent years. No matter whether we are at home, in the gym, at work, or elsewhere, we are haunted by the need to be part of something online. We live alternative online lives, and we have dense networks of […]
Article Published on The Hacker New Magazine – August Edition “Botnet” Introduction The nightmare of millions of infected computers synchronized to conduct an attack on specific target finds materialization in the concept of botnet. In the classic architecture each machine, named bot, executes orders sent by a master unit called bootmaster, which can instruct the various […]
Yes Guys, when we think to the deep web the media tell us only about its dark side, it’s considered the paradise of cybercrime, the reign of the theft, a place to escape, but is it true? The governments want you to ay far from the hidden web, because they cannot spy on you, the […]