A serious vulnerability has been found in the authentication process of the popular network LinkedIN, the news published on the…
Who is attacking WikiLeaks and The Pirate Bay? WikiLeaks and BitTorrent file-sharing site Pirate Bay were hit by a series of…
We often discuss about warfare and cyberespionage, focusing on the usage of technology to steal intellectual property of foreign states.…
In last months we have a long discussed about the security status of US networks and infrastructures, we have described…
The NFC technology Near field communication (NFC) is a set of standards for Smartphones and similar devices to establish radio communication with each other by…
Article Published on The Hacker New Magazine – May Edition “They are Not What You Think they Are … they are…
The word "Anonymous " evokes the myth of the hacker in today's society that defends freedom of expression and agrees…
True, sometimes the big discoveries are the daughters of the case. That's what happened to Panos Ipeirotis, a researcher of…
We all know about the malware Stuxnet and Duqu considered unanimously the first examples of cyber weapon developed by a…
The article is published on the last edition of Pentest Magazine. Enjoy the reading, the magazine is free and to download…
This website uses cookies.