DDoS

Malware and new sophisticated cyber techniques against bankingMalware and new sophisticated cyber techniques against banking

Malware and new sophisticated cyber techniques against banking

Money motivates the cyber assault to banking by cybercrime, but the finance world is also considered a privileged target for…

13 years ago
The malware factoryThe malware factory

The malware factory

Article Published on The Hacker New Magazine – June Edition “Malware” With the term malware we refer a heterogeneous family of…

13 years ago
Plan X, new lymph to US cyber warfare capabilitiesPlan X, new lymph to US cyber warfare capabilities

Plan X, new lymph to US cyber warfare capabilities

Recent events have demonstrated the strategic importance of the cyber strategy the needs to chair the cyber space, many experts…

13 years ago
The hacktivism phenomenonThe hacktivism phenomenon

The hacktivism phenomenon

Article published on The Malta Indipendent The last years have been characterised by the escalation of operations conducted by hacktivist groups,…

13 years ago
Who is attacking WikiLeaks and The Pirate Bay? The private revengeWho is attacking WikiLeaks and The Pirate Bay? The private revenge

Who is attacking WikiLeaks and The Pirate Bay? The private revenge

Who is attacking WikiLeaks and The Pirate Bay? WikiLeaks and BitTorrent file-sharing site Pirate Bay were hit by a series of…

13 years ago
NFC, business opportunities, security and privacy issuesNFC, business opportunities, security and privacy issues

NFC, business opportunities, security and privacy issues

The NFC technology Near field communication (NFC) is a set of standards for Smartphones and similar devices to establish radio communication with each other by…

13 years ago
They are Not What You Think They are … They are HacktivistsThey are Not What You Think They are … They are Hacktivists

They are Not What You Think They are … They are Hacktivists

Article Published on The Hacker New Magazine – May Edition “They are Not What You Think they Are … they are…

13 years ago
Anonymous Reloaded. Yesterday, today, tomorrowAnonymous Reloaded. Yesterday, today, tomorrow

Anonymous Reloaded. Yesterday, today, tomorrow

The word "Anonymous " evokes the myth of the hacker in today's society that defends freedom of expression and agrees…

13 years ago
Google used as cyber weapon. New attack method foundGoogle used as cyber weapon. New attack method found

Google used as cyber weapon. New attack method found

True, sometimes the big discoveries are the daughters of the case. That's what happened to Panos Ipeirotis, a researcher of…

13 years ago
Russian cybercrime, not only a localized threatRussian cybercrime, not only a localized threat

Russian cybercrime, not only a localized threat

Several times I wrote on cybercrime trying to analyze a phenomenon that grows with an impressive rhythm. The trend is…

13 years ago