Hacking

The malware factory

Article Published on The Hacker New Magazine – June Edition “Malware” With the term malware we refer a heterogeneous family of…

13 years ago

Hacktivist vs Twitter, security of OAuth authorization

There isn’t peace for social network platforms, priority target for cybercrime and governments, they represent a mine of data useful…

13 years ago

Anonymous, #OPIndia against censorship

Again Anonymous, again another hack in the name of freedom and against the censorship, this time the famous Anonymous have…

13 years ago

LinkedIn passwords compromised.Social network poisoning & other risks

It's happened, today has been diffused the news that users’ passwords of the most famous business social network LinkedIn have…

13 years ago

In the shadow of the Flame, Warner Bros, China Telecom & US Navy hacks

What's happening while the world's attention is on Flame malware? The cyberspace is a very turbulent place where groups of…

13 years ago

The hacktivism phenomenon

Article published on The Malta Indipendent The last years have been characterised by the escalation of operations conducted by hacktivist groups,…

13 years ago

Wake up Anonymous, the world is getting used to you!

What is happening to Anonymous? His media energy seems to be at risk addiction just when major security firm are beginning to consider it as one of the most…

13 years ago

DDoS attack against 123-reg, the Chinese paranoia

The UK’s companies 123-reg, the biggest domain provider,  was hit this week by a “massive” DDoS attack that caused interruption…

13 years ago

What is the Deep Web? A first trip into the abyss

  The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported…

13 years ago

Iranian hackers against NASA,isolated attack or cyber warfare act?

Exactly on week ago a group of Iranian hackers named Cyber Warriors Team claimed to have compromised an SSL certificate…

13 years ago

This website uses cookies.