malware

“Mobile” intrigue … A prying eyes to carry around …

Let we use these ingredients to start some serious reflection on safety issues related to mobile devices: Robust growth in…

14 years ago

From printers to ovens … next step hack our brains.

Are we able to ensure that every peripherals connected to our computers and present in our offices is proof of attack? The first answer will be ... “sure”.  We observe same problem with…

14 years ago

Cloud…a long journey towards a secure paradigm

When I discussed with many colleagues regarding cloud paradigm most of them smiled declaring that we face yet another found…

14 years ago

How much cost malware production? Which are the processes for the production of virus? (Part.1)

It is clear that the question awaits an answer deterministic, but an assessment of the main factors that influence the "final expense". My idea is to understand what is the magnitude of…

14 years ago

Water utilities hacked … another SCADA system attack

The SCADA systems at the Water utilities in Illinois were hacked by a malicious attacker. “the SCADA system was powered…

14 years ago

Massive DNS poisoning: What happened to brazilian ISPs?

What is purpose for DNS cache poisoning attacks? DNS cache poisoning is an  attack methodology used to compromise in the…

14 years ago

Duqu … Do we really know the enemy?

In recent months we have read many reports related the analysis of the famous malware  and different assumptions about its genesis. Who designed the malicious agent? For what purpose? What features of Duqu…

14 years ago

On demand Calling service for cybercriminals growing

Trusteer Researchers have found a professional calling service that has been designed for cybercriminals needs. The service is organized to…

14 years ago

Hacked MIT Server Used to Stage Attacks, Scan for Vulnerabilities

Bitdefender reseachers have discovered a number of brute force attacks against several web site. The attacks have been done using…

14 years ago

New variants of the DevilRobber Mac OS X TrojanFound in Trojaned Apps Are Stealing Data

Mac malware has been making some headlines in the last few months, as attackers have begun applying to OS X…

14 years ago

This website uses cookies.