Hacking

The Deep Dark Web Book Released

After much work during the last months I'm proud and happpy to announce the publishing of The Deep Dark Web…

13 years ago

Prolexic Q3 2012 … a new generation of DDoS attacks

The second half of 2012 is started with an sensible increase of Distributed denial-of-service attacks against financial institutions and banking…

13 years ago

Tens of zero day vulnerabilities, millions of users exposed

Every day we read about cyber threats, zero day vulnerabilities and new patch to apply so I decided to speak…

13 years ago

Why do we need hackers today?

In the last decade the role of hacker is deeply changed, these strange characters were once kept away from government…

13 years ago

The good and the bad of the Deep Web

  Article Published on The Hacker New Magazine – September Edition “Security in a serious way” Introduction The Deep Web (or…

13 years ago

All you have to know on DDoS attack against GoDaddy

Yesterday was a terrible day, late afternoon in Europe Time, I noted that my blog Security Affairs, was down. I…

13 years ago

Social Networks Part 3 – Are you exposing yourself unnecessarily to physical threats?

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins In our first article we…

13 years ago

Reuters blogging platform hacked, the critical role of information

In this day my blog has dedicated a great attention to the security of social media, explaining the importance of…

14 years ago

Rakshasa, is it possible design the perfect hardware backdoor?

Every day we read about new powerful variants of malware of increasing complexity, they are used in fraud schemas by…

14 years ago

Power Pwn & Darpa projects for development of hacking tool

We have discussed several time of the interference of governments inside our ordinary life, they try to control our network,…

14 years ago

This website uses cookies.