Cyberspace between cybercrime and the challenges of the High-Tech era

|

We are pleased to announce the emergence of a new reference volume for cybersecurity professionals and enthusiasts and the field of cybercrime: ”Spațiul cibernetic între criminalitatea informatică și provocările epocii High Tech” (“Cyberspace between cybercrime and the challenges of the … Read More

A threat for WhatsApp on Android phones: PixPirate

|

The security team at IBM Trusteer realized a warning about a security breach through a piece of malware, PixPirate. PixPirate is a new and sophisticated Android banking Trojan that has been targeting users in Brazil and other Latin American countries … Read More

The impact of DoS (Denial of Service) cyberattacks on a Local Area Network (LAN)

|

In this paper I will highlight a modus operandi of hackers launching Denial of Service (DoS) cyberattacks. I will theoretically show how CAM Overflow and TCP SYN Flood attacks can be performed, using Kali Linux, a Linux distribution used by … Read More

Printed edition of the book ”Beginner’s Guide for Cybercrime Investigators”

|

It has been published the printed edition of the book ”Beginner’s Guide for Cybercrime Investigators” Pages: 103, Binding: Paperback, Interior Color: Black & White, Dimensions: US Trade (6 x 9 in / 152 x 229 mm) Lulu Press: https://www.lulu.com/shop/nicolae-sfetcu/beginners-guide-for-cybercrime-investigators/paperback/product-1mw7zdp9.html In … Read More

Report on Big Data & Data Analytics in Homeland Security Market

|

The use of big data and data analytics by Homeland Security, Public Safety organizations and Intelligence agencies is on the rise, mostly because the world is becoming more digital and connected. This is creating new opportunities, not only for data … Read More

EU citizens want a higher level of privacy protection

|

A large majority of the 27,000 respondents to the Eurobarometer survey say that the privacy of their personal information, their online communications and their online behaviour is very important. In particular: More than seven in ten (72%) state that it … Read More

Take care of a new Facebook Messenger malware

|

In accordance with CheckPoint, the ransomware visrus is also present on LinkedIn. Usually, the computer is infected by a download of a .svg image that redirect to a video requiering tu install a pseudo-extension needed to rule the video. A … Read More

Denial of service

|

A denial-of-service (DoS) attack is any of certain forms of malicious damage to computer systems. The aim of such an attack is to prevent legitimate users from accessing their services. A DoS attack is generated in a number of ways. … Read More

Fork bomb

|

The fork bomb is a form of denial of service attack against a computer system. It relies on the assumption that the number of programs and processes which may be simultaneously executed on a computer has a limit. A fork … Read More

Computer bugs

|

(Photo of first computer bug.) A computer bug is a fault in a computer program which prevents it from working correctly. Bugs arise from mistakes in either a program’s source code or its design. It is said that there are … Read More

Buffer overflow

|

A buffer overflow is a type of computer bug. When the length limitation of a space reserved for data – a buffer – is not properly enforced, a buffer overflow may occur. Input data is written to the buffer and, … Read More

Blue screen of death

|

The so-called blue screen of death, also abbreviated as BSoD, refers to the screen displayed by Microsoft’s Windows operating system when it cannot (or is in danger of being unable to) recover from a system error. There are two Windows … Read More

1 2 3 4 9