Incident

Red Cross Blood Service incident. The Australian largest ever leak of Personal dataRed Cross Blood Service incident. The Australian largest ever leak of Personal data

Red Cross Blood Service incident. The Australian largest ever leak of Personal data

The Australian Red Cross Blood Service confirmed the data leak that exposed a backup database containing the personal details of…

9 years ago
Flame malware, from genesis to the plot theoryFlame malware, from genesis to the plot theory

Flame malware, from genesis to the plot theory

In this article I desire to discuss about many personal doubts and beliefs regarding the Flame malware, first my idea…

13 years ago
China-made US military chip, security backdoor or debugging functionality?China-made US military chip, security backdoor or debugging functionality?

China-made US military chip, security backdoor or debugging functionality?

During last days an insistent news circulated on the internet, a microchip used by the US military and manufactured in…

13 years ago
Google used as cyber weapon. New attack method foundGoogle used as cyber weapon. New attack method found

Google used as cyber weapon. New attack method found

True, sometimes the big discoveries are the daughters of the case. That's what happened to Panos Ipeirotis, a researcher of…

13 years ago
Iran, 3M bank accounts hacked.Hypothesis on cyber warfare scenarioIran, 3M bank accounts hacked.Hypothesis on cyber warfare scenario

Iran, 3M bank accounts hacked.Hypothesis on cyber warfare scenario

The story that I desire to report seems the plot of a movie, Khosrow Zarefarid an Iranian software manager after…

13 years ago
Medicaid incident. How much cost a data breach?Medicaid incident. How much cost a data breach?

Medicaid incident. How much cost a data breach?

The Utah Department of Technology Services (DTS) has announced that the Utah Department of Health (UDOH) was victim of an…

13 years ago
Governments and gaming platforms, it’s time for warfareGovernments and gaming platforms, it’s time for warfare

Governments and gaming platforms, it’s time for warfare

The US government is financing several activities to investigate and hack into the technology spread in every device that ordinary…

13 years ago
Cyber terrorism, cyber attacks against al Qaeda 2.0Cyber terrorism, cyber attacks against al Qaeda 2.0

Cyber terrorism, cyber attacks against al Qaeda 2.0

The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we…

13 years ago
Cyber WeaponsCyber Weapons

Cyber Weapons

Article Published on The Hacker New Magazine - April Edition "Cyber_Warfare" First let's try to provide a definition of cyber-weapon,…

13 years ago
UPGRADE – VISA, MASTERCARD and GPN breachUPGRADE – VISA, MASTERCARD and GPN breach

UPGRADE – VISA, MASTERCARD and GPN breach

The day is come, yesterday morning as planned Global Payments Inc., the Atlanta-based credit and debit card processor that recently…

13 years ago