16-31 January 2013 Cyber Attacks Timeline

Two Weeks Living Dangerously! I have no other words to describe this second half of January (first two weeks here)

Read more

1-15 January 2013 Cyber Attacks Statistics

Here are the statistics for the Cyber Attacks occurred in the first half of January 2013 and included inside the corresponding Cyber Attack Timeline.... Read More

Read more

1-15 January 2013 Cyber Attacks Timeline

So here we are with the first Cyber Attacks Timeline for 2013 covering the first half of January. Apparently the

Read more

December 2012 Cyber Attacks Statistics

December (and hence this 2012) is gone, so it is time to analyze the statistics for the corresponding Cyber Attacks Timelines.... Read More

Read more

1-15 December 2012 Attack Statistics

Let us gave a look to the landscape of Cyber Attacks, during the first half of December 2012. Apparently cybercrooks are taking a break for Christmas, since, according to my selection Criteria, the number of attacks has shown a small decrease in comparison with the previous months.... Read More

Read more

November 2012 Cyber Attacks Statistics

From an information security perspective, November has been a month with two faces. The first part of the month has been characterized by hacktivism, nevertheless the Cyber Crime has reached an unprecedented level with the 69% of occurrences.... Read More

Read more

1-15 November 2012 Cyber Attacks Statistics

This November 2012 seems really to be endless from an Information Security Perspective. We have assisted so far to a remarkable number of Cyber Attacks.... Read More

Read more

Yet Another Breach Targeting Adobe

Logo of Adobe Systems Incorporated... Read More

Read more

DDoS and SQLi are the Most… Discussed Attack Techniques

Imperva has just published the results of its annual analysis on one of the largest-known hacker forums counting approximately 250,000 members.... Read More

Read more

1-15 October 2012 Cyber Attacks Timeline

Apparently October has shown a decrease in the number of Cyber Attacks. At least from a mere numerical perspective. It

Read more
%d bloggers like this: