hacktivism

Visit the front pageVisit your profilePublish a blog post

KDMS Team hacked also ESET and BitDefender. Th3 J35t3r has found them

#OpLastResort & #OpBigBrother, Anonymous against governments

 

The big, fake, Anonymous ransomware

 

The Deep Dark Web book - order now!

This Book covers the main as

TEDxToronto 2012 Speaker Ronald J. Deibert, Director, The Citizen Lab

Join us for the fourth annual TEDxToronto conference, taking place on October 26, 2012 at The Son

Anonymous AAPT data breach, 180k records published, 263k incoming

Japan institutions victim of cyber espionage, is it cyber warfare?

Malware... It’s all about you...

Article published on The Malta Indipendent

by Ron Kelson - Vice Chair ICT Gozo Malta Project, Pierluigi Paganini – Director and CISO of Bit4ID, Italy and Benjamin Gittins - CTO Synaptic Laboratories Ltd.

The military strategist Carl von Clausewitz stated:

“All war presupposes human weakness and seeks to exploit it.”

Malicious software (malware) is software that is explicitly designed to exploit vulnerabilities in computing devices and human users to the malicious advantage of the malware author or malware user. Malware comes in many forms, including computer viruses, worms, trojan, spyware, ransom-ware, ad-ware, root kits, and so on.

Anonymous, Wikileaks & Par:anoIA, evolution of hacktivism

In the last months we have assisted of an intensification of the operations that we common locate

Cyberwarfare: The strategic importance of defense

I was reading an interesting article on the cyber wars I was attracted by the comparison of Stuxnet to the first nuclear bomb detonated at a site nicknamed Trinity in the barren Jornada del Muerto desert of New Mexico on  July 16, 1945.

Pages