Trojan

How much cost malware production? Which are the processes for the production of virus? (Part.2)

Here I am, as promised, to continue the research started together regarding the cost of malware. Reading news of more…

12 years ago

“Cyber India” lights and shadows of the country full of contradictions

The Economy of India is the ninth largest in the world by nominal GDP and the fourth largest by purchasing power parity (PPP). The country is a part of the G-20…

12 years ago

Stuxnet, Duqu & Conficker, a new generation of cyber weapons … even “without a father”

Cyber warfare expert John Bumgarner claims that the Stuxnet and Duqu virus have been active for much longer than previously…

12 years ago

Cybercrime, an industry that knows no crisis

  During this days I had the opportunity to read the results of a couple of surveys: The PricewaterhouseCoopers (PwC).…

12 years ago

“Mobile” intrigue … A prying eyes to carry around …

Let we use these ingredients to start some serious reflection on safety issues related to mobile devices: Robust growth in…

12 years ago

From printers to ovens … next step hack our brains.

Are we able to ensure that every peripherals connected to our computers and present in our offices is proof of attack? The first answer will be ... “sure”.  We observe same problem with…

12 years ago

How much cost malware production? Which are the processes for the production of virus? (Part.1)

It is clear that the question awaits an answer deterministic, but an assessment of the main factors that influence the "final expense". My idea is to understand what is the magnitude of…

12 years ago

Water utilities hacked … another SCADA system attack

The SCADA systems at the Water utilities in Illinois were hacked by a malicious attacker. “the SCADA system was powered…

12 years ago

Cyber Threats, high social impact but … which is the level of awareness?

Last week I had the opportunity to discuss with my father of adverse economic situation and in particular of the…

12 years ago

Massive DNS poisoning: What happened to brazilian ISPs?

What is purpose for DNS cache poisoning attacks? DNS cache poisoning is an  attack methodology used to compromise in the…

12 years ago

This website uses cookies.