Public offer of Zeus FaaS service on Facebook My readers know very well the dynamic of cybercrime enterprise and in particular of…
Critical vulnerability in Viber allow bypass security mechanisms We have discussed in various occasions of security in mobile environments, mobile device are becoming the center of…
When the HTTP protocol was born in 1999, no one ever thought it will be used by one of the…
Researchers at Hacktive Security, an independent security consulting company, have demonstrated how much insidious could be a so a simple…
Many times we discussed about large diffusion of mobile devices and of related cyber threats, around a months ago I…
Many times we discussed about the fact that FinFisher was discovered in the wild, the use of popular spyware has been…
The excellent researchers at ReVuln, Luigi Auriemma and Donato Ferrante, presented at Black Hat Europe 2013 in Amsterdam a way to…
Recently many security portals, including Security Affairs, have presented analysis on underground markets and the increased demand of malware and…
WebSense has just released 2013 Threat Report, an interesting analysis of cyber threats based on data collected by the Websense…
Recent studies of principal security firms revealed that phishing activities in the last years have increased exponentially, cybercrime is targeting…
This website uses cookies.