Hacking

Massive DNS poisoning: What happened to brazilian ISPs?

What is purpose for DNS cache poisoning attacks? DNS cache poisoning is an  attack methodology used to compromise in the…

14 years ago

Hacking satellites

In a few days we have heard of a couple of satellite attacks by hackers meanwhile surfing on the web…

14 years ago

Elude control … let’s digitally sign malware code

F-Secure Researchers have discovered a digitally signed malware that has code signed with a stolen government certificate belonging to the…

14 years ago

The business of Censorship. Golden Shield Project, but not only …

""If you open the window for fresh air,  you have to expect some flies to blow in" this is the Deng Xiaoping’s phrase, which summarizes the essence of the…

14 years ago

Duqu … Do we really know the enemy?

In recent months we have read many reports related the analysis of the famous malware  and different assumptions about its genesis. Who designed the malicious agent? For what purpose? What features of Duqu…

14 years ago

Video game & Security, a new opportunity? Gaming platform primary target for cyber attacks. (EN/IT)

English version Which could be a critical objective to choose if we evaluate media coverage of the event, complexity and effort…

14 years ago

Trojan & Co, the new frontiers of espionage

Once upon a time the espionage made by agents who essentially lived in complete anonymity and free of the past were able to recover the greatest amount of information about…

14 years ago

The Next Generation Search Engine Hacking Arsenal

The title is borrowed from a presentation made by Francis Brown of Stach & Liu, Hacker Halted 2011 in Miami. The presentation focus on two topics that are crucial in the modern scenario: Cloud Computing Search…

14 years ago

Public Tender for an Internet Content Monitoring System, really strange.

Few days ago I have partecipated to an open discussion started by Stefano Mele, a security  and cyber-terrorism expert, on the development of Internet Content Monitor…

14 years ago

Hacked MIT Server Used to Stage Attacks, Scan for Vulnerabilities

Bitdefender reseachers have discovered a number of brute force attacks against several web site. The attacks have been done using…

14 years ago

This website uses cookies.