malware

Israel – AP Exclusive reveals tunnel hit by cyber attack

Cybersecurity experts revealed that a major artery in Israel's national road network located in the northern the city of Haifa…

12 years ago

Subcontractors are for hackers the weakest link in security chain

Hackers use to target subcontractors to hit big enterprises due the poor level of security they offer, in the energy…

12 years ago

Cyber Threat summit 2013 – Modern online-banking cybercrime

"Modern online-banking cybercrime" -The presentation analyzes current context for cybersecurity in Banking focusing on cyber threats and countermeasures. Today I…

12 years ago

NSA FOXACID servers used to drive the hack into target systems

NSA leaked documents reveals the existence of FOXACID servers that provides an automated hacking platform used to drive operators into…

12 years ago

How to exploit iFramed based traffic E-shop for illegal activities

What is an E-shop for iFramed traffic and how does cybercrime exploit it? In this post thanks to the investigation of the incredible…

12 years ago

How to create undetectable malware with Mac encryption mechanism

Researcher Daniel Pistelli demonstrated how to exploit Mac internally encryption mechanism to create an undetectable Mac OS X Malware. During the…

12 years ago

Reading IBM X-Force 2013 Mid-Year Trend and Risk Report

IBM issued the X-Force 2013 Mid-Year Trend and Risk Report, a detailed analysis of current security landscape, including data on…

12 years ago

FireEye World War C report – Nation-state driven cyber attacks

FireEye security firm released World War C report to explain nation-state motives behind advanced Nation-state driven cyber attacks. Nation-state driven…

12 years ago

F-Secure published Threat Report H1 2013 on security landscape

IT security firm F-Secure has published its Threat Report H1 2013, the document proposes a focus on Java exploits, mobile threats, Bitcoin mining,…

12 years ago

Icefog – Kaspersky discovered the group of cyber mercenaries

Kaspersky Lab discovered the emerging group of cyber-mercenaries Icefog available for hire to perform surgical hit and run operations against…

12 years ago

This website uses cookies.