mobile

Zeus hit five major banks in JapanZeus hit five major banks in Japan

Zeus hit five major banks in Japan

Zeus malware is considered the most popular and prolific malicious code for banking, it is one of the privilege agent…

12 years ago
Dissecting a mobile malwareDissecting a mobile malware

Dissecting a mobile malware

The capillary diffusion of mobile devices, the lack of security systems on these platforms and low level of awareness on…

12 years ago
Bouncer, new phishing variant from RSABouncer, new phishing variant from RSA

Bouncer, new phishing variant from RSA

Despite simplicity of the schema phishing attacks have increased exponentially in the last years targeting every sector,both public and private.…

12 years ago
My reading of the “ENISA Threat Landscape” reportMy reading of the “ENISA Threat Landscape” report

My reading of the “ENISA Threat Landscape” report

The European Network and Information Security Agency (ENISA) is the EU’s agency responsible for cyber security issues of the European…

12 years ago
Hackers, a need for cyber securityHackers, a need for cyber security

Hackers, a need for cyber security

Ten years, that is the time interval that has totally changed the worldwide perception for the role of hacker, these…

12 years ago
Hacktivism and web monitoring in 2013 for Security AffairsHacktivism and web monitoring in 2013 for Security Affairs

Hacktivism and web monitoring in 2013 for Security Affairs

The year is ending and it’s very easy to read forecast for next year, experts are sure that we will…

12 years ago
TheAndroid.DDoS.1.origin, a new malware detected on Android mobileTheAndroid.DDoS.1.origin, a new malware detected on Android mobile

TheAndroid.DDoS.1.origin, a new malware detected on Android mobile

In line with expectations a new cyber threat is menacing the mobile, in particular the most diffused OS, Android. The…

12 years ago
US develop exploitation methods for mobile devices while refuse UN treatyUS develop exploitation methods for mobile devices while refuse UN treaty

US develop exploitation methods for mobile devices while refuse UN treaty

Just one week ago a UN treaty was approved to update 24-year-old United Nations telecommunications rules. The agreement states that…

12 years ago
How were stolen 36M euro with Eurograbber malwareHow were stolen 36M euro with Eurograbber malware

How were stolen 36M euro with Eurograbber malware

Zeus, a name that security experts know very well, it's one of the most prolific and dangerous malware of the history.…

12 years ago
Sophos Security Threat Report 2013, today … tomorrowSophos Security Threat Report 2013, today … tomorrow

Sophos Security Threat Report 2013, today … tomorrow

Sophos was one of the first security firms that has published a report, Sophos Security Threat Report 2013, on current…

12 years ago