Hacking

LinkedIN – Vulnerability in the authentication process and related risks

A serious vulnerability has been found in the authentication process of the popular network LinkedIN, the news published on the…

13 years ago

Who is attacking WikiLeaks and The Pirate Bay? The private revenge

Who is attacking WikiLeaks and The Pirate Bay? WikiLeaks and BitTorrent file-sharing site Pirate Bay were hit by a series of…

13 years ago

Concerns for Chinese firms and the cyberespionage

We often discuss about warfare and cyberespionage, focusing on the usage of technology to steal intellectual property of foreign states.…

14 years ago

Has Anonymous infiltrated US Government? The insider issue

In last months we have a long discussed about the security status of US networks and infrastructures, we have described…

14 years ago

NFC, business opportunities, security and privacy issues

The NFC technology Near field communication (NFC) is a set of standards for Smartphones and similar devices to establish radio communication with each other by…

14 years ago

They are Not What You Think They are … They are Hacktivists

Article Published on The Hacker New Magazine – May Edition “They are Not What You Think they Are … they are…

14 years ago

Anonymous Reloaded. Yesterday, today, tomorrow

The word "Anonymous " evokes the myth of the hacker in today's society that defends freedom of expression and agrees…

14 years ago

Google used as cyber weapon. New attack method found

True, sometimes the big discoveries are the daughters of the case. That's what happened to Panos Ipeirotis, a researcher of…

14 years ago

Stuxnet & Duqu, update on cyber weapons usage

We all know about the malware Stuxnet and Duqu considered unanimously the first examples of cyber weapon developed by a…

14 years ago

Walk trough the penetration testing fundamentals

The article is published on the last edition of Pentest Magazine. Enjoy the reading, the magazine is free and to download…

14 years ago

This website uses cookies.