16-31 January 2013 Cyber Attacks Timeline

Two Weeks Living Dangerously! I have no other words to describe this second half of January (first two weeks here)

Read more

The Quassam Group Stops the Cyber Attacks Against US Banks

Finally it looks like the DDoS attacks against US Banks, carried on by the Izz ad-Din al-Qassam Cyber Fighters in

Read more

1-15 January 2013 Cyber Attacks Statistics

Here are the statistics for the Cyber Attacks occurred in the first half of January 2013 and included inside the corresponding Cyber Attack Timeline.... Read More

Read more

1-15 January 2013 Cyber Attacks Timeline

So here we are with the first Cyber Attacks Timeline for 2013 covering the first half of January. Apparently the

Read more

OpIsrael Confirms the Cyber-space is the Fifth Domain of War

The Israeli Cyber Space is under attack by Anonymous hackers in retaliation for the Israeli operation “Pillar of Defence“. The military operation began on Wednesday with the killing of Ahmed Al-Jaabari, the commander of the military wing of Hamas, whose car has been hit by an Israeli Missile... Read More

Read more

October 2012 Cyber Attacks Timeline

Click here for the first part covering the Cyber Attacks from 1 to 15 October 2012. Here is the timeline

Read more

DDoS and SQLi are the Most… Discussed Attack Techniques

Imperva has just published the results of its annual analysis on one of the largest-known hacker forums counting approximately 250,000 members.... Read More

Read more

16-30 September 2012 Cyber Attacks Timeline

Part One with 1-15 September 201 Timeline Here. September is over and it’s time to analyze this month from an

Read more

Even Botnets Go on Holidays!

The attack model based on botnet-generated Distributed Denials of Service is opportunistic. The botmaster selects a target, gathers as many resources as possible among his army of zombie machines, and when he realizes to have achieved enough firepower, simply selects a target and pushes the attack button. After this the target is inevitably flooded by packets generated by the bots, while the unaware owners of the zombie machines perform their normal work or fun activities with their infected computers.... Read More

Read more
%d bloggers like this: