Hacking

How cybercrime uses a compromised Skype account

In various articles I wrote on the large diffusion of botnets and the capabilities of malicious agents to use as…

13 years ago

#OpIsrael, 7 APRIL Anonymous plans a massive attack against Israel

The day is near, the group of hackers belonging to the collective of Anonymous declared in a unanimous way, war…

13 years ago

The role of hacktivism in cyber warfare scenario between 2 Koreas

It’s not a surprise South Korean security experts suggest that the North Korea military is training an elite force of…

13 years ago

Hacktive Security discoveries flaw in Ruzzle protocol that menaces user’s privacy

Researchers at Hacktive Security, an independent security consulting company, have demonstrated how much insidious could be a so a simple…

13 years ago

#OpIsrael & attack to Mossad,cyber dispute or misinformation campaign?

Israel is considered by various group of hacktivists an enemy state to fight, for this reason they decide a joint…

13 years ago

T-Mobile MITM, a starting point to discuss mobile security

Many times we discussed about large diffusion of mobile devices and of related cyber threats, around a months ago I…

13 years ago

Flaw in Sky.it web site allows brute force attack

Sky is a brand names for satellite television providers and channels, owned or partially owned by News Corporation an American diversified multinational mass…

13 years ago

ReVuln – gaming platforms as vector of cyber attack

The excellent researchers at ReVuln, Luigi Auriemma and Donato Ferrante, presented at Black Hat Europe 2013 in Amsterdam a way to…

13 years ago

Indian pentester discovers a flaw in Google Drive

As usual I was reading the news on The Hacker New security portal when a post attracted my attention, another…

13 years ago

NIST – National Vulnerability Database website hacked

The news is curious as it is worrying, unknown hackers have violated the US government repository of standards based vulnerability…

13 years ago

This website uses cookies.