When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead's final target -- and its covert origins. In a fascinating look inside cyber-forensics, he explains how.
- Download Anonymous Hacktivist New Tool Airchat
- Password cracking: A mega collection of password cracking word lists
- How to secure your social media accounts: Twitter, Facebook and LinkedIn
- Anonymous Europe: Massive Country sorted Proxy list 500 items
- Malaysian Airlines MH370 Finally Found! Watch the video | Facebook malware
- Obama: I’m Not Going To Be Scrambling Jets To Get A 29-Year-Old Hacker
- Advanced Persistent Threat APT Cyber Attack, Video
- Google code used to circumvent privacy protections ... true or false?
- First 30min sneak preview Game of Thrones season 3 leaked #GoT
- The most Dangerous Hackers In Kavkaz Preparing for A Big Attack on Russia
- The 3 headed monster: Iranian Cyber Army helping Lulzsec and Anonymous ?
- Information Warfare, Russia, New Zeland...it is arms race
- There is more to cyberwar than death and destruction
Recent blog posts
- Russia announces new restrictions Law on the Internet freedom
- I have a SIEM, now what?
- Caught between the Lines: Online Censorship Harms Corporate Security
- Malicious Software
- Mahdi campaign, ongoing cyber-espionage in the Middle East
- The Economics of Hacking
- The State of Information Security
- Do you know your enemy?
- Israel and Iran, expense, capabilities and cyber strategies
- Non-Decryptable? Really?
Cyberwarfare: Just a scary name to increase budget or real threat
My opinion can be found in the comment section
Total votes: 556