malware

Stuxnet, are we really safe now? No, of course!

Once again I draw inspiration from the argument "Stuxnet" on which much is being read on the web at this…

14 years ago

Chinese Attacks on Defense Contractors, 2 clues are evidence

It's not first time and the news itself doesn't rapresent a surprise, once again Chinese hacker groups are involved in…

14 years ago

Malware evolution and the Frankenmalware case

In the last decade we have witnessed an extraordinary evolution of those agents technically defined as the term "malware" in…

14 years ago

Zeus,software as a service – Implications for civil and military

As previously said the cyber crime industry is proving to be invoiced in a thriving company that knows no crisis.…

14 years ago

Koobface, an excuse to talk about botnets and cyber crime

Koobface virus is undoubtedly considered as the malware of social network because it uses them as spread channel. We have…

14 years ago

Japan Aerospace Exploration Agency hit by malware

To news like this we are dangerously getting used, the scenarios change but the dynamics are often the same, viruses…

14 years ago

Sykipot attacks U.S PKI infrastructures based on smart cards

In these hours on the web is turning the news of a cyber attack performed by a group of Chinese…

14 years ago

Banking sector, bad news regarding cyber threats

The new year does not bode well in terms of cyber threats banking universe. The need for new services, primarily…

14 years ago

2012, the threat of malware. Evolution in the mobile scenario

Wanting to try out hypotheses about the future of the spread of malware, we cannot help but examine the mobile…

14 years ago

Why the use of a cyber weapon has proved a winner?

In recent months one of the topics of greatest interest in the international scientific community has been the development of…

14 years ago

This website uses cookies.