malware

The rise of exploit kits according to Solutionary SERT

Today I desire to discuss about a very interesting study by Solutionary's Security Engineering Research Team (SERT) that shared the…

13 years ago

Use of electromagnetic waves to infiltrate sealed networks

In the last months I had the opportunity many times to read about the possible use, in cyber warfare context,…

13 years ago

New variant of banking malware Shylock spread via Skype

The news is very concerning, a new variant of the banking malware known as Shylock has been detected, it includes the…

13 years ago

Kaspersky Lab discovered the cyber espionage campaign “Red October”

Last October Kaspersky Lab’s Global Research & Analysis Team started a new investigation after several attacks hit computer networks of…

13 years ago

Confidential documents from Japanese politics stolen by malware

Last December Japan Aerospace Exploration Agency was hit again by malware  that stolen secret information on newest rockets from an…

13 years ago

DARPA HACMS program for a software without pervasive vulnerabilities

Technology in modern warfare has assumed a crucial role, every government is developing new cyber capabilities to be able to…

13 years ago

Hacktivism and web monitoring in 2013 for Security Affairs

The year is ending and it’s very easy to read forecast for next year, experts are sure that we will…

13 years ago

The “company” cybercrime seen by Fortinet

Fortinet company, the worldwide provider of network security appliances and a market leader in unified threat management (UTM), has recently…

13 years ago

Android malware for SMS spam botnet

Everywhere is possible to read rivers of words on the impressive diffusion of social networks and mobile devices, both technologies…

13 years ago

Iran, the cyber shooting range, new malware detected

On December 16th the Iranian Maher center issued an advisory warning of a new "targeted data wiping" malware discovered during…

13 years ago

This website uses cookies.