A threat for WhatsApp on Android phones: PixPirate

|

The security team at IBM Trusteer realized a warning about a security breach through a piece of malware, PixPirate. PixPirate is a new and sophisticated Android banking Trojan that has been targeting users in Brazil and other Latin American countries … Read More

Printed edition of the book ”Beginner’s Guide for Cybercrime Investigators”

|

It has been published the printed edition of the book ”Beginner’s Guide for Cybercrime Investigators” Pages: 103, Binding: Paperback, Interior Color: Black & White, Dimensions: US Trade (6 x 9 in / 152 x 229 mm) Lulu Press: https://www.lulu.com/shop/nicolae-sfetcu/beginners-guide-for-cybercrime-investigators/paperback/product-1mw7zdp9.html In … Read More

Vulnerabilities and unauthorized results in cybercrime

|

Vulnerabilities To get the results he want, an attacker must use a computer or network vulnerability, which is defined as follows: Vulnerability is a weakness of the system allowing unauthorized action. These are errors that occur in different stages of … Read More

Attacks and tools in cybercrime

|

Attacks Sometimes, an event that occurs on a computer or network is part of a series of steps to produce an unauthorized event. This event is then considered as part of an attack. An attack has several elements. First, it … Read More

Online security events, actions, and targets

|

Operation of computers and networks is composed of a series of events. An event is changing the state of a system or device. From information security point of view, these mood swings occur as a result of actions that are … Read More

Events, attacks and incidents for the security of online information

|

Three basic security concepts are important in terms of information on the Internet: confidentiality, integrity and availability. The concepts related to people who use this information are authentication, authorization and acceptance. When the information is read and copied by someone … Read More

Classification of risks and incidents in cyberworld

|

Classifications can be made according to several criteria. We will review some of them: Classification as a list of terms A popular but simplistic classification is a list of defined terms. An example is as follows: Cables and signals interception … Read More

Classification of cyber attackers according to their skills and objectives

|

Another presentation identifies five categories of intruders, each with different skills, levels of knowledge, especially with different objectives. All these categories can come from both outside and inside the company. The novice is usually a lone rookie. No computer experience … Read More

Typologies of cyber attackers

|

There have been numerous attempts to achieve a typology of perpetrators, their classification categories ranging from two to no more than 26. Criteria for delineation of these types are mainly two: the motivations of authors and their legal consequences. The … Read More

Cybercrime

|

In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and “steal” all your valuable data. Just as in the real world, … Read More

The first attacks on the Internet

|

November 2, 1988 is an important day for the Internet. On that day a graduate of Cornell University in the United States, Robert Morris Jr., executed a worm type program, the first program that has affected in a very serious … Read More

Cross-site scripting

|

Cross-site scripting (XSS) is a computer vulnerability usually found in web applications which allow code injection by malicious web users into the web pages viewed by other users. Examples of such code include HTML code and client-side scripts. An exploited … Read More

1 2