Hacking

How to turn any phone into a spy device with hardware hack

No peace for mobile environment that due its impressive increase is attracting cyber criminals and hackers like never before. The…

13 years ago

Hackers hit International Atomic Energy Agency (IAEA) agency

Another victim of cyber attacks, the UN nuclear agency International Atomic Energy Agency (IAEA) has confirmed that one of its…

13 years ago

#OpIsrael, all about offensive of Anonymous against Israel

Hacktivism attacks will not change Israeli policy but for sure their operations could represent a dangerous cyber threat for any…

13 years ago

LTE networks vulnerable to jamming, a question of national security

Few months and also in Italy the wireless industry will live its mobile connectivity revolution with the introduction of new…

13 years ago

Skype, serious vulnerability found

The news is circulating with insistence on the net, Skype is suffering from a vulnerability that can expose its users…

13 years ago

Anonymous #OpVendetta, 11/5 day of meditation for information security

The world is holding its breath, the cyber threat is announced by the Anonymous group who has decided to celebrate…

13 years ago

Russian Underground is just part of a global criminal network

Trend Micro published a very interesting report on the Russian underground market, the document written by Max Goncharov analyzed the…

13 years ago

#AntiSecIT Analysis of the Anonymous Italian job

Last week I discussed with a friend on the risks related to attacks of the group Anonymous against strategic offices…

13 years ago

The Deep Dark Web Book Released

After much work during the last months I'm proud and happpy to announce the publishing of The Deep Dark Web…

13 years ago

Prolexic Q3 2012 … a new generation of DDoS attacks

The second half of 2012 is started with an sensible increase of Distributed denial-of-service attacks against financial institutions and banking…

13 years ago

This website uses cookies.