• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Cyber Defense Magazine – March 2021 has arrived. Enjoy it!
  • Bug bounty hunter awarded $50,000 for a Microsoft account hijack flaw
  • Attackers took over the Perl.com domain in September 2020
  • Four zero-days in Microsoft Exchange actively exploited in the wild
  • Google fixes Critical Remote Code Execution issue in Android System component
  • Pwn20wnd released the unc0ver v 6.0 jailbreaking tool
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Hacking (Page 588)

Hacking

SQL Injection, XSS and URL Redirect found in popular websites

Security Researcher Mohamed Osman Saeed has identified numerous vulnerabilities and reported them all, they include SQL Injection, XSS and URL Redirect. Security Researcher Mohamed Osman Saeed has identified numerous vulnerabilities and reported them...

November 3, 2013  By Pierluigi Paganini   Posted In  Hacking 

Google hacking – Automated website hacking tools based on Google dorks

Google Hacking is a formidable method for reconnaissance. Mass website hacking tools based on Google-dorks advantage the malicious online activities. Google hacking is a must for hackers and pen testers, the popular search engine is a mine of information...

November 3, 2013  By Pierluigi Paganini   Posted In  Hacking 

Anonymous OpNSA Campaign – OSINT to predict DDoS attacks on Nov 5th

  OpNSA analyzed with OSINT techniques based on the correlation of media activities and physical protests. The analysts provided a forecast on next attacks. Web Intelligence analysis alerts on early signs of an Anonymous cyber campaign dubbed OpNSA...

November 1, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence  Security  Social Networks 

Prolexic on the Distributed Reflection Denial of Service attacks

Prolexic DDoS Attack Report reveals an increasing interest of cybercrime in Distributed Reflection Denial of Service technique, efficient and cost-effective. Prolexic Quarterly Global DDoS Attack Report revealed an increasing interest of cybercrime in Distributed...

October 31, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

Twitter Unrestricted File Upload Vulnerability

Security expert Ebrahim Hegazy has found another serious vulnerability in Twitter, he has discovered an Unrestricted File Upload Vulnerability. The popular Ebrahim Hegazy has found another serious vulnerability in Twitter, the cyber security...

October 30, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Wi-Fi HTTP Request Hijacking attack against iOS users

Wi-Fi HTTP Request Hijacking attack against iOS - the researchers at Skycure have demonstrated a new technique that menaces mobile users. I'm not surprised for trust given by Internet users to public Wi-Fi networks that are notoriously insecure, wrong...

October 30, 2013  By Pierluigi Paganini   Posted In  Hacking  Security 

Business Intelligence – Intro to reconnaissance

Exploring the Business Intelligence module proposed by the online course of the Hacker Academy - Intro to reconnaissance phase for a penetration testing. One of the most important components of the reconnaissance process in pen testing activity is the business...

October 29, 2013  By Pierluigi Paganini   Posted In  Hacking  Intelligence  Security 

Social media and digital identity. Prevention and incident response

The hack of a social media account is a common incident that could have a serious impact of our digital identity. How to prevent it? What to do in case of hack? Social media, cloud computing and mobile are technologies that most of all attract cybercriminals...

October 29, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security  Social Networks 

Syrian Electronic Army hacked President Obama website and social media

Syrian Electronic Army Targeted President Obama's website, Twitter and Facebook accounts and email account linked to his non-profit activities. Once again Syrian Electronic Army, the pro-Assad group claims it has hacked the President Barack Obama’s...

October 28, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

Israel – AP Exclusive reveals tunnel hit by cyber attack

Cybersecurity experts revealed that a major artery in Israel's national road network located in the northern the city of Haifa suffered a cyber attack. Israel is considered one of the most advanced country in cyber security, but at the same time is a privileged...

October 28, 2013  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Security 


« First‹ Previous584585586587588589590591592Next ›Last »
Page 588 of 619



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT