16-31 October 2013 Cyber Attacks Timeline

And here we are we the second part of the October 2013 Cyber Attacks Timeline (first part here). It’s interesting

Read more

January 2012 Cyber Attacks Timeline (Part 1)

Click here for part 2. New year, new Cyber Attacks Timeline. Let us start our Information Security Travel in 2012

Read more

December 2011 Cyber Attacks Timeline (Part I)

As usual, here it is my compilation of December Cyber Attacks. It looks like that Christmas approaching is not stopping

Read more

November 2011 Cyber Attacks Timeline (Part II)

The second half of November has confirmed the trend seen in the previous report covering the first half of the

Read more

Anatomy Of A Twitter Scam

Do you remember Mobile Phishing and the related risks? Well This morning I had a bad surprise and could see it anction with my hands (or better with my fingers on the display of my Android Device).... Read More

Read more

Finally I Saw One!

Update: F-Secure posted in their blog the complete description on how the patient 0 was found: And here it is the infamous “2011 recruitment plan message”.... Read More

Read more

Is Your Credit Card Stolen?

Are you an hardcore Playstation gamer hit by the infamous PSN Breach? (the infamous PSN Breach not the (In)famous PS3 hit… Or rather are you a Citi Card Holder afraid that your card, not yet replaced, has been compromised?... Read More

Read more

If Phishing Goes Mobile…

One of the most surprising things I noticed concerning the Lockheed Martin Affair, was the affirmation contained in the Reuters Article, made  by Rick Moy, president of NSS Labs, indicating that the initial RSA attack was followed by malware and phishing campaigns seeking specific data to link tokens to end-users (an indirect evidence of the same authors behind the infamous RSA breach and the Lockheed Martin attack.... Read More

Read more
%d bloggers like this: