Context Information Security issued the report “Web Application Vulnerability Statistics 2013” that provides statistic on Web Application Vulnerabilities based on data gathered from a range of IT security activities and consultancy engagements during last three years. The number of data breaches is increasing in concerning way also thanks to numerous cyber attacks that exploited Web Application Vulnerabilities in many web […]
Information provided by the results of principal researches on the cybercrime reveals resources,motivations and methods and cost illegal operations. Fortinet has published early 2013 the Fortinet’s 2013 cybercrime report, an interesting study on cybercriminal ecosystem, identifying the operations, the motivations, the methods, the resource used and countermeasure adoptable to mitigate the cyber threats As demonstrated […]
China and US governments continue to exchange accusations about the continuing incursions into the respective national networks. China and US governments continue to exchange accusations about the continuing incursions into the respective national networks, the cyber attacks are mainly motivated by sabotage and cyber espionage purposes and are increasing exponentially. US government and intelligence agencies […]
When the HTTP protocol was born in 1999, no one ever thought it will be used by one of the most dangerous Cyber threats called Botnet. A bot is an application that can perform and repeat a particular task faster than a human. When a large number of bots infect different targets (e.g. Computers and […]
Last week was monopolized by the discussion on cyber attacks that hit North and South Korea, but I found a news equally stunning, researchers at Hungary-based CrySyS Lab have discovered a decade-long cyber espionage campaign that targeted high-level political and industrial entities in Eastern Europe. The attackers, dubbed by security researchers TeamSpy, used the popular remote-access […]
Early this month it was spread the news regarding a sophisticated cyber espionage campaign against principal media agencies in the US, included NYT and Washington Post, the hackers have tried to compromise the email account of journalists to steal sensitive information. The campaign appeared very aggressive, the hackers have tried to infiltrate the network of […]
The year is ending and it’s very easy to read forecast for next year, experts are sure that we will assist to a sensible increase of state-sponsored attacks and to the raise of sophisticated malware, both cyber threats will exploit large scale channels such as mobile and social networks. The majority of forecast are focused […]