mobile

HTTP-Botnets: The Dark Side of a Standard Protocol!HTTP-Botnets: The Dark Side of a Standard Protocol!

HTTP-Botnets: The Dark Side of a Standard Protocol!

When the HTTP protocol was born in 1999, no one ever thought it will be used by one of the…

12 years ago
Hacktive Security discoveries flaw in Ruzzle protocol that menaces user’s privacyHacktive Security discoveries flaw in Ruzzle protocol that menaces user’s privacy

Hacktive Security discoveries flaw in Ruzzle protocol that menaces user’s privacy

Researchers at Hacktive Security, an independent security consulting company, have demonstrated how much insidious could be a so a simple…

12 years ago
T-Mobile MITM, a starting point to discuss mobile securityT-Mobile MITM, a starting point to discuss mobile security

T-Mobile MITM, a starting point to discuss mobile security

Many times we discussed about large diffusion of mobile devices and of related cyber threats, around a months ago I…

12 years ago
FinFisher found everywhere, more complexity and ready for mobileFinFisher found everywhere, more complexity and ready for mobile

FinFisher found everywhere, more complexity and ready for mobile

Many times we discussed about the fact that FinFisher was discovered in the wild, the use of popular spyware has been…

12 years ago
ReVuln – gaming platforms as vector of cyber attackReVuln – gaming platforms as vector of cyber attack

ReVuln – gaming platforms as vector of cyber attack

The excellent researchers at ReVuln, Luigi Auriemma and Donato Ferrante, presented at Black Hat Europe 2013 in Amsterdam a way to…

12 years ago
The malicious mobile marketplace explained by Group-IBThe malicious mobile marketplace explained by Group-IB

The malicious mobile marketplace explained by Group-IB

Recently many security portals, including Security Affairs, have presented analysis on underground markets and the increased demand of malware and…

12 years ago
My read of WebSense 2013 Threat ReportMy read of WebSense 2013 Threat Report

My read of WebSense 2013 Threat Report

WebSense has just released 2013 Threat Report, an interesting analysis of cyber threats based on data collected by the Websense…

12 years ago
Is phishing really going down? No, it is only migrated to mobileIs phishing really going down? No, it is only migrated to mobile

Is phishing really going down? No, it is only migrated to mobile

Recent studies of principal security firms revealed that phishing activities in the last years have increased exponentially, cybercrime is targeting…

12 years ago
Mobile cyber threats, from risky apps to black market activityMobile cyber threats, from risky apps to black market activity

Mobile cyber threats, from risky apps to black market activity

Mobile is probably technology that is having the greatest growth, an increasing number of users execute any kind of application…

12 years ago
Serious security flaws affect millions of HTC mobile devicesSerious security flaws affect millions of HTC mobile devices

Serious security flaws affect millions of HTC mobile devices

The news of those who make a lot of noise, more than 18 million devices commercialized by Taiwanese company HTC…

12 years ago