cyber security

Reading the ENISA Threat Landscape report for Internet Infrastructure

ENISA published a study on the on the threat landscape and provides a list of good practices that aim at…

11 years ago

Wireless Aerial Surveillance Platform, the DIY Spy Drone

Vespid is amongst most the important espionage artifacts based on the Wireless Aerial Surveillance Platform for the for the construction…

11 years ago

ENISA issued the Evaluation Framework on National Cyber Security Strategies (NCSS)

ENISA has presented at the workshop on National Cyber Security Strategies in Brussels the Evaluation Framework on National Cyber Security…

11 years ago

The US energy industry is constantly under cyber attacks

Data related to the number of incidents occurred to national infrastructure confirms that the US Government energy industry is constantly…

11 years ago

Brian Krebs Hacked … the big hoax

A man has published on PasteBin a fake dump of the database of the popular website KrebOnSecurity managed by the…

11 years ago

ICS-CERT warns on the rise in attacks on online ICS

A reading of the data issued by the ISC-CERT in its Monthly Monitor (ICS-MM201404) on the attacks against ICS (industrial…

12 years ago

Critical Infrastructure, hackers targeted public utility SCADA

Cyber attacks could pose a potentially huge risk to US critical infrastructure, state-sponsored hackers and cyber criminals are increasing their…

12 years ago

Hacking Google server using a malicious XML is possible

A Team of researchers discovered a critical XML External Entity (XXE) vulnerability on Google server that allows an attacker to…

12 years ago

Darpa is looking for experts from private sector for future cyber ops

Darpa is scouting the private companies to recruit high skilled professional and use company infrastructure to protect classified information. The…

12 years ago

Ruby on Rails CookieStore flaw exposes thousand of websites

A security issue inside cookie-based storage mechanism of Ruby on Rails could expose thousand websites to cyber attacks. Ruby on…

12 years ago

This website uses cookies.