Hacked ATM’s, millions of dollars and mysterious software. This is the story of jackpotting, ploutus and the gigantic Carbanak Hack.
Continue ReadingHacking
Control of the Internet
The Hacker Crackdown an 18-month long collaborative effort of the United States Secret Service and AT&T to take control of the Internet in the early 1990s.
Continue ReadingCyberwars Invisible Warfare
Today hackers have become veritable covert foot soldiers of the state, leading the cyberwars of tomorrow.
Continue ReadingTelstra Data Breach
Telstra has apologized to thousands of people whose data was published online.
Continue ReadingFire Rescue Victoria Cyber Attack
Fire Rescue Victoria will have to operate manually for the foreseeable future after a suspected cyber attack comprised the agency’s dispatch system.
Continue ReadingAIIMS Cyber Attack Chinese Hackers
Delhi Police have written a letter to the Central Bureau of Investigation on Chinese hackers through Interpol for the cyber attack on AIIMS.
Continue ReadingHomeless White Hat Hacker
White Hat Hacker Adrian Lamo broke into several computer networks of high-profile companies and got himself entangled in a controversy involving WikiLeaks.
Continue ReadingBlack Hat Hacker Interview
Black Hat Hacker interview and portrait of Gummo, a computer black hat hacker from Jacksonville, Florida.
Continue ReadingCanada’s Most Notorious Hacker
When Michael ‘MafiaBoy’ Calce Canada’s Most Notorious Hacker was just 15 years old, he took down the websites of some of the largest companies in the world.
Continue ReadingMoney System of North Korea
How is it possible that North Korea, one of the poorest countries on earth finances a nuclear weapons programme large enough to challenge the USA?
Continue ReadingNetwork Vulnerabilities
In this video, two professional cyber-security experts and will be describing the importance of network vulnerabilities.
Continue ReadingMicrosoft Digital Defense Report 2022
Microsoft Digital Defense Report presents data and insights about the current state of cybercrime, nation state threats, cyber influence operations, and more.
Continue ReadingAustralian Cyber Trains Ukraine
Internet 2.0 will provide cyber security intelligence support in Ukraine to help protect against Russian cyber-attacks.
Continue Reading








