Hacking

Team GhostShell hacktivists against temples of knowledge

In this days the hacking group Team GhostShell claimed credit for the hack of  servers of the 100 principal universities…

13 years ago

GAO invites FDA to improve Information Security for medical devices

In the last decade the number of cyber incidents related to technologies that surround us is growth exponentially, the principal…

13 years ago

Chinese cyber attack against White House Office

The news is circulating on internet creating great concern, once again Chinese hackers have hit an infrastructure of a foreign…

13 years ago

The good and the bad of the Deep Web

  Article Published on The Hacker New Magazine – September Edition “Security in a serious way” Introduction The Deep Web (or…

13 years ago

Botnet, pro & cons of using Tor Networks

As declared several time Deep Web, thanks to the anonymity of its connection, provides to cyber criminals an ideal environment…

13 years ago

All you have to know on DDoS attack against GoDaddy

Yesterday was a terrible day, late afternoon in Europe Time, I noted that my blog Security Affairs, was down. I…

13 years ago

Elderwood project, who is behind Op. Aurora and ongoing attacks?

Today, I would like to discuss the real effects of a cyber attack. We have recently introduced the direct and…

13 years ago

AntiSec steals 1M Apple UDID from FBI notebook with an exploit

Another blow was dealt to the authorities by a group of hackers linked to Anonymous that claims to have breached…

13 years ago

Social Networks Part 3 – Are you exposing yourself unnecessarily to physical threats?

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins In our first article we…

13 years ago

Anonymous, from Philips to UK Government…a hot autumn is coming

The summer is ending and we must be prepared to a new season of attacks of Anonymous collective, last weeks…

13 years ago

This website uses cookies.