malware

Citadel trojan, migration of cybercrime to the deep web

We all remember the Citadel trojan, based on  the Zeus experience has evolved becoming one of the most interesting cyber…

14 years ago

Drones vulnerable to hijacking, concerns on security and privacy

Last week a saw a satellite image taken by Google Earth related to a mysterious vehicle, apparently an unmanned aerial…

14 years ago

Dalai Lama + Mac OS X = APT with Tibet malware

Another excellent discovery of the active experts of Kaspersky Labs that have identified a new variant of the malware used…

14 years ago

Stratfor refunds clients.Concerns on subcontractors in the security chain

Last Christmas the Stratfor Global Intelligence was hacked by Anonymous who disclosed company website and also the full client list…

14 years ago

RSA SecurIDs Cracked In 13 Minutes,rumors and denials

The news has creating great surprise in the security community, a group of computer scientist has declared that has cracked…

14 years ago

Capfire4, malware-as-a-service platform for crime

It’s not first time we discuss of cybercrime and in particular of its organizational models, creative servicex offer any kind…

14 years ago

The ‘cyber war’ era began long ago

Article published on The Malta Indipendent by Ron Kelson, Pierluigi Paganini, Benjamin Gittins, David Pace  US military strategist John Boyd states: “War…

14 years ago

A virus specialized for AutoCAD, a perfect cyber espionage tool

In recent years we are assisting to a profoundly change in the nature of malware, it is increased the development…

14 years ago

Malware and new sophisticated cyber techniques against banking

Money motivates the cyber assault to banking by cybercrime, but the finance world is also considered a privileged target for…

14 years ago

On new generation of P2P botnets

Zeus is one of the longest-running malware that raged for months, appearing in various forms on the web thanks to…

14 years ago

This website uses cookies.