Sicurezza delle Infrastrutture IT
  • December 31, 2013

    A history of major cyber attacks

    A history of major cyber attacks: Experts say that concentrated cyber-attacks have the ability to cripple a nation’s ability to defend itself and destroy its economy and national wealth. Here is a list of some large recent cyber attacks: 2011 – Operation Shady RAT is an ongoing series of cyber attacks that began in mid-2006 […]

  • December 31, 2013

    Russian hacker HASH took control of a BBC server

    Russian hacker HASH took control of a BBC server: The Russian hacker known as “HASH” and “Rev0lver” took control of a BBC server and attempted to sell access to it to other cybercriminals. A hacker compromised a server at the BBC (British Broadcasting Corporation) and started a Christmas Day campaign to sell the access to […]

  • December 31, 2013

    Why I Have Become Pessimistic About Indian IT

    Why I Have Become Pessimistic About Indian I.T.: When Wall Street Journal and Forbes published articles, a few years ago, predicting the demise of Indian IT, I responded in BusinessWeek that they were dead wrong. I said that the outsourcing market had a long way to go before it peaked; rising salaries and attrition rates […]

  • December 31, 2013

    Target: Customer PIN Data Is Encrypted

    Target: Customer PIN Data Is Encrypted: Despite the massive theft of credit and debit card account information on Target customers, the retailer emphasizes that critical information is still encrypted. U.S. retail giant Target is still reeling from the impact of a massive data breach affecting 40 million credit and debit card accounts, though the company […]

  • December 31, 2013

    Why NSA spied on inexplicably unencrypted Windows crash reports

    Why NSA spied on inexplicably unencrypted Windows crash reports: The National Security Agency’s X-KEYSCORE program gives the spy agency access to a wide range of Internet traffic. Any information that isn’t encrypted is, naturally, visible to passive Internet wiretaps of the kind the NSA and other intelligence agencies use. This in turn will typically expose […]

  • December 31, 2013

    High School Students vs. the NSA

    High School Students vs. the NSA: Believe it or not, the NSA has more secrets than we—or maybe even Edward Snowden—suspected. In addition to knowing German Chancellor Angela Merkel’s (and potentially your) cell phone information, I found it revealing when watching last week’s 60 Minutes report that the National Security Agency’s HR department is no […]

  • December 30, 2013

    The NSA Actually Intercepted Packages to Put Backdoors in Electronics

    The NSA Actually Intercepted Packages to Put Backdoors in Electronics: The NSA revelations keep on coming, and if you’re feeling desensitized to the whole thing it’s time to refocus and get your game face on for 2014. Because shit continues to get real. SPIEGEL published two pieces this morning about the NSA’s Tailored Access Operations […]

  • December 30, 2013

    NSA Win Leaves Security of Cell, Cloud Data Uncertain

    NSA Win Leaves Security of Cell, Cloud Data Uncertain: The decision of a New York judge that the wholesale collection of cell-phone metadata by the National Security Agency is constitutional ties the score between pro- and anti-NSA forces at one victory apiece. The contradictory decisions use similar reasoning and criteria to come to opposite conclusions, […]

  • December 30, 2013

    MIT Study: “Devil in the Details” of Supply Chain Risk Management

    MIT Study: “Devil in the Details” of Supply Chain Risk Management: Industry analysts agree that it’s important to make risk assessment an ongoing process, allowing for frequent plan updates as political conditions, fuel prices, tariffs, currency exchange rates, labor costs, and other supply chain security threats arise. Up until now, the focus for most US […]

  • December 30, 2013

    ARP Spoofing Malware Infection Project Spotted & Source Code is Disclosed to LE & Industries

    ARP Spoofing Malware Infection Project Spotted & Source Code is Disclosed to LE & Industries: Self spreading malware project to infect other nodes using ARP spoofing based scanner was spotted back in several month, our intelligence reported and we keep on monitoring its progress ever since, and the moronz involved just has been released in […]

Categories

  • Hacks and Incidents
  • Security News
  • Security Techniques
  • Uncategorized

Copyright © 2025 by ISGroup SRL - All Rights Reserved