Cyber Attackers who wreaked havoc in Suffolk County’s computer networks allegedly demanded $2.5M in ransom from the county.
Continue ReadingHacking
US Vulnerable to Cyber-Attacks
A rare look inside the U.S. Cyber Command whose mission is to protect the country against foreign cyber-attacks and to use cyber weapons.
Continue ReadingHow Hackers Rob ATM’s
Hacked ATM’s, millions of dollars and mysterious software. This is the story of jackpotting, ploutus and the gigantic Carbanak Hack.
Continue ReadingControl of the Internet
The Hacker Crackdown an 18-month long collaborative effort of the United States Secret Service and AT&T to take control of the Internet in the early 1990s.
Continue ReadingCyberwars Invisible Warfare
Today hackers have become veritable covert foot soldiers of the state, leading the cyberwars of tomorrow.
Continue ReadingTelstra Data Breach
Telstra has apologized to thousands of people whose data was published online.
Continue ReadingFire Rescue Victoria Cyber Attack
Fire Rescue Victoria will have to operate manually for the foreseeable future after a suspected cyber attack comprised the agency’s dispatch system.
Continue ReadingAIIMS Cyber Attack Chinese Hackers
Delhi Police have written a letter to the Central Bureau of Investigation on Chinese hackers through Interpol for the cyber attack on AIIMS.
Continue ReadingHomeless White Hat Hacker
White Hat Hacker Adrian Lamo broke into several computer networks of high-profile companies and got himself entangled in a controversy involving WikiLeaks.
Continue ReadingBlack Hat Hacker Interview
Black Hat Hacker interview and portrait of Gummo, a computer black hat hacker from Jacksonville, Florida.
Continue ReadingCanada’s Most Notorious Hacker
When Michael ‘MafiaBoy’ Calce Canada’s Most Notorious Hacker was just 15 years old, he took down the websites of some of the largest companies in the world.
Continue ReadingMoney System of North Korea
How is it possible that North Korea, one of the poorest countries on earth finances a nuclear weapons programme large enough to challenge the USA?
Continue ReadingNetwork Vulnerabilities
In this video, two professional cyber-security experts and will be describing the importance of network vulnerabilities.
Continue Reading






