When the HTTP protocol was born in 1999, no one ever thought it will be used by one of the most dangerous Cyber threats called Botnet. A bot is an application that can perform and repeat a particular task faster than a human. When a large number of bots infect different targets (e.g. Computers and […]
Researchers at Hacktive Security, an independent security consulting company, have demonstrated how much insidious could be a so a simple and crimeless large scale application. We are in the digital era, everything is connected to the large networks and applications benefit of even more complex devices that deeply interact with the owner, in this scenario […]
Many times we discussed about large diffusion of mobile devices and of related cyber threats, around a months ago I presented the case of HTC mobile that revealed 18 million devices commercialized by Taiwanese company had security flaws that could exposes users to serious risks, in particular the bugs could allow the theft of information […]
Many times we discussed about the fact that FinFisher was discovered in the wild, the use of popular spyware has been abused by governments and intelligence agencies all around the world. The spyware is for law enforcement and government use, but it seems to be preferred for those regimes that desire to monitor representatives of the […]
The excellent researchers at ReVuln, Luigi Auriemma and Donato Ferrante, presented at Black Hat Europe 2013 in Amsterdam a way to convert local bugs and features in remotely exploitable security vulnerabilities by using the popular EA Origin 3 platform as an attack vector against remote systems. EA Origin is one of the biggest gaming related digital […]
Recently many security portals, including Security Affairs, have presented analysis on underground markets and the increased demand of malware and exploit tools. In this post I desire to propose to readers the results of investigation made by researchers at Group-IB, a security firm resident of the Moscow-based Skolkovo Foundation. Mobile malware black market is not well […]
WebSense has just released 2013 Threat Report, an interesting analysis of cyber threats based on data collected by the Websense ThreatSeeker Network. The study confirmed the growth of cyber threats able to elude traditional defense mechanisms and that mainly targeted mobile platforms and social media. Internet is confirmed as primary vector for cyber menaces, web threats […]
Recent studies of principal security firms revealed that phishing activities in the last years have increased exponentially, cybercrime is targeting every sector from industry to government institutions and of course private citizens. RSA’s October Online Fraud Report 2012 confirmed a large increase in phishing attacks, up 19% over the second half of 2011. The total loss […]
Mobile is probably technology that is having the greatest growth, an increasing number of users execute any kind of application on their devices in mobility. The categories of applications are various, they are used at work and during leisure time and offer any kind of feature of various complexity. These applications, the technologies they use […]
The news of those who make a lot of noise, more than 18 million devices commercialized by Taiwanese company HTC had security flaws that could exposes users to serious risks in particular the bugs could allow the theft of information stored on the mobile and the tracking of user’s location. The vulnerabilities appear serious according […]