Hackers

Anonymous vigilantes are fighting against the ISIS propaganda

The New York Times reported that a group of hackers is interfering with the activities made through social media by…

11 years ago

Operation Woolen Goldfish, a hacking campaign in the wild

Security experts at Trend micro uncovered a new hacking campaign dubbed Operation Woolen Goldfish likely run by a threat actor…

11 years ago

South Korea – Hacker requests money for data on nuclear plants

Hacker who posted online information on Nuclear Plants in South Korea demands money for not selling other sensitive information to…

11 years ago

Pentagon plans to hire 3,000 Cyber pros for the US Cyber Command

Federal officials announced that military received the green light to hire 3,000 cyber experts to assign to the US Cyber…

11 years ago

NCA, British National Crime Agency arrested a suspected Pentagon Hacker

British NCA has arrested a 23-year-old man suspected to be a member of the hacking crew that run the attack…

11 years ago

Hacking the hackers : A cyber resilience approach

A cyber resilience approach: the need to become cyber resilient is very essential because eliminating risks completely is impossible. Hacking…

11 years ago

The value of personal data in the criminal underground

Which is the cost of personal data in the criminal underground? How cyber criminals steal personal data? Which is the…

11 years ago

Cybercrime, a dangerous and attractive lifestyle for young cyber talents

Cybercrime is a dangerous and attractive lifestyle for young cyber talents. Which are the strengths of a winning model that…

11 years ago

Cyber attack on German steel factory caused severe damage

The annual IT security report issued by the German BSI reported that a sophisticated cyber attack on a steel factory…

11 years ago

Serbia – Hackers claimed to have stolen the entire national database

A group of hackers claims to have compromised the national database system stolen all information related to citizens resident in…

11 years ago

This website uses cookies.