Tag Archives: Hacking

Anonymous: what to know about a worldwide hacking group

Anonymous: what to know about a worldwide hacking group

Anonymous is the most famous hacktivist group in the world. It gained international attention when it attacked the website of the Church of Scientology in 2008. As an informal group without a sanctioned hierarchy, it is difficult to explain what Anonymous is to the general public and to non-experts. The various hackers behind Anonymous worldwide are united in a belief that corporations and organizations they consider to be corrupt should be attacked. To do so, they use #DDoS attacks, as this is the most common method Anonymous uses to bring down the servers of their target. There is much more to talk about this group, however. Let’s us find out […]

Kevin Mitnick: the computer-break-in artist

Kevin Mitnick: the computer-break-in artist

Kevin Mitnick was the most elusive computer break-in artist in history. Security experts often refer to him as the “The World’s Most Wanted Hacker”. Indeed, the US Feds took almost three years to catch him. How he did managed to do that? Let’s explore his story, then! Hacking activity Grown up in Los Angeles, Mitnick wanted to become a magician. When he learned how to make phone calls with a little blue box, he became curious about comms. This also included how phone systems work and ultimately hacked phone companies systems to learn more. Hacking into corporate networks and stealing data landed the teenager in jail. Indeed, he stole computer handbooks […]

Take a hacker seriously: the story of Raphael Grey

Take a hacker seriously: the story of Raphael Grey

You will take a hacker seriously after reading the story of Raphael Grey. Raphael Grey managed to hack several e-commerce sites, accessing the customers’ credit card data for a month in 2000 at the age of 18. This hack allowed him to steal several million dollars before he was arrested by the British police and the American FBI at his home in rural Wales on March 23, 2000. Prior to his arrest, Grey posted thousands of payment data on the web to highlight the inherent weaknesses of the e-commerce sites of the time. Today we explore the activities of the best known hackers in the history of computer science, known […]

AiR-ViBeR: the hack that exploits PC fans

AiR-ViBeR: the hack that exploits PC fans

Cyber ​​risks, as we know, have always been around the corner. They are insidious and can even silently affect the data of companies and individuals quite easily, if not adequately protected. Some threats are “louder” than others: Mordechai Guri, an Israeli researcher at Ben Gurion University of the Negev, managed to steal data from a PC, not connected to any network connection, by exploiting the vibration of the fans. The hack is called AiR-ViBeR and in order to work it needs to gain access to a PC and a second device that is in close proximity, such as a smartphone. But how does it work? The intrusion method is very […]

The guy who hacked Twitter: “Kirk” and the human factor

The guy who hacked Twitter: “Kirk” and the human factor

It was a 17-year-old hacker who managed to persuade some Twitter employees that he was a collaborator of the technology department who needed the credentials to log into the customer support portal. Resident of Tampa, Florida, Graham Ivan Clark – known by the pseudonym Kirk – is defined by investigators as a teenager out of the ordinary. The story Having obtained the passwords, “Kirk” was able to enter the Twitter computer system. The intrusion involved access to hundreds of VIP profiles including Barack Obama and Bill Gates, but also Jeff Bezos, Mike Bloomberg, Warren Buffet, Wiz Khalifa, Floyd Mayweather, Elon Musk, and Kanye West. Kirk’s goal was to publish fake […]

The double extortion technique: the Campari case

The double extortion technique: the Campari case

In recent weeks the Campari group has suffered a serious ransomware attack of the so-called “double extortion” technique. The damage would amount to two terabytes of stolen data, with attached the threat to publish it if the company does not pay $15 million. The attack and the reaction of the company The ransom was carried out by the Ragnar Locker criminal group that, using the same technique, struck Capcom about a month ago, threatening the publication or auctioning of data. The nature of the information stolen from Campari remains confidential, even if the well-known Italian company has admitted the possibility of a loss – not quantified – of personal data […]

The revolutionary methods to attack air-gapped devices

The revolutionary methods to attack air-gapped devices

In the last few years, the Cyber-Security Research Center of Israel’s Ben Gurion University of the Negev coordinated by Dr. Mordechai Guri, has developed and tested several new types of malware that allow to covertly steal highly sensitive data from air-gapped and audio-gapped systems. Here we will briefly analyse some of the most surprising techniques that they have successfully tested.      What air-gapped systems are and the difficulty of hacking them The term “air-gapping” indicates a network security measure employed on one or more computers to ensure that a certain computer system is physically isolated from unsecured networks, such as the public Internet or an unsafe local area network. Air-gapped […]

Hacking Artificial Intelligence

Hacking Artificial Intelligence

Will hacking artificial intelligence be the most severe threat of the near future? Indeed, enemies of the future will not necessarily need bombs, missiles or atomic weapons to instil terror in civilian populations. Then ,they will need only some tape, scissors and good practical skills and they can magically transform a stop sign into a green light in the eyes of a self-driving car, causing crashes and disorder. Using an Artificial Intelligence attack (AI attack) adversaries can manipulate AI systems in order to alter their behaviour to serve a malicious end goal. The real effect of these attacks grows as artificial intelligence and IoT systems are further integrated into critical […]

Cybersecurity & Cyberattacks: a Hand-In-Hand Development Through The Years

Cybersecurity & Cyberattacks: a Hand-In-Hand Development Through The Years

Cybersecurity & Cyberattacks are concepts that developped hand-in-hand. Let’s discover how! Cybersecurity & Cyberattacks: the birth of Internet The birth of the internet and the digital era brought to the light the theme of “cybersecurity”, that over the past years gained more and more importance. Security, indeed, has always been a challenge for IT people and corporate organizations alike since the launching of the first internet network, ARPAnet. During the seventies, the first viruses appeared in this web, that was developed for military purposes and that later on  became a universal  tool. Robert Thomas was the engineer who developed the first malware called “creeper”. He realized that it was possible […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close