Incident

Red Cross Blood Service incident. The Australian largest ever leak of Personal data

The Australian Red Cross Blood Service confirmed the data leak that exposed a backup database containing the personal details of…

9 years ago

Flame malware, from genesis to the plot theory

In this article I desire to discuss about many personal doubts and beliefs regarding the Flame malware, first my idea…

14 years ago

China-made US military chip, security backdoor or debugging functionality?

During last days an insistent news circulated on the internet, a microchip used by the US military and manufactured in…

14 years ago

Google used as cyber weapon. New attack method found

True, sometimes the big discoveries are the daughters of the case. That's what happened to Panos Ipeirotis, a researcher of…

14 years ago

Iran, 3M bank accounts hacked.Hypothesis on cyber warfare scenario

The story that I desire to report seems the plot of a movie, Khosrow Zarefarid an Iranian software manager after…

14 years ago

Medicaid incident. How much cost a data breach?

The Utah Department of Technology Services (DTS) has announced that the Utah Department of Health (UDOH) was victim of an…

14 years ago

Governments and gaming platforms, it’s time for warfare

The US government is financing several activities to investigate and hack into the technology spread in every device that ordinary…

14 years ago

Cyber terrorism, cyber attacks against al Qaeda 2.0

The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we…

14 years ago

Cyber Weapons

Article Published on The Hacker New Magazine - April Edition "Cyber_Warfare" First let's try to provide a definition of cyber-weapon,…

14 years ago

UPGRADE – VISA, MASTERCARD and GPN breach

The day is come, yesterday morning as planned Global Payments Inc., the Atlanta-based credit and debit card processor that recently…

14 years ago

This website uses cookies.