Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

Anonymous Denies Paternity For the CNAIPIC Hack

  • Post author:
  • Post last modified:July 27, 2011
  • Post category:Cyberwar/Security
  • Post comments:4 Comments
  • Reading time:3 mins read
  • Post published:July 27, 2011

The CNAIPIC Hack is becoming paradoxical. Yesterday Italian Security Professional (and Italian Newspapers) are literally gone crazy in analyzing the…

Continue ReadingAnonymous Denies Paternity For the CNAIPIC Hack

The Hand of The Lulz Boat For the CNAIPIC Hack?

  • Post author:
  • Post last modified:July 25, 2011
  • Post category:Cyberwar/Security
  • Post comments:4 Comments
  • Reading time:5 mins read
  • Post published:July 25, 2011

After the initial surprise more details are being divulged about the CNAIPIC Hack disclosed this morning. CNAIPIC stands for Centro…

Continue ReadingThe Hand of The Lulz Boat For the CNAIPIC Hack?

Italian Cyber Police Hacked?

  • Post author:
  • Post last modified:July 25, 2011
  • Post category:Security
  • Post comments:5 Comments
  • Reading time:5 mins read
  • Post published:July 25, 2011

Update: Anonymous Italy posted the content of the statement in Italian, meanwhile BBC and Gizmodo suggest an internal origin for…

Continue ReadingItalian Cyber Police Hacked?

AnonPlus Hacked (Again) by Syrian Group

  • Post author:
  • Post last modified:July 24, 2011
  • Post category:Cyberwar/Security
  • Post comments:8 Comments
  • Reading time:5 mins read
  • Post published:July 24, 2011

Update August 9: Anonplus defaced once again by Syrian Hackers! There is no peace for AnonPlus the alternative Social Network…

Continue ReadingAnonPlus Hacked (Again) by Syrian Group

The Two Faces of Hacking

  • Post author:
  • Post last modified:July 20, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:5 mins read
  • Post published:July 20, 2011

My colleague Massimo Biagiotti suggested me this interesting matrix from IEEE which originally indicated some of the biggest and best…

Continue ReadingThe Two Faces of Hacking

Someone has been arrested for using LOIC

  • Post author:
  • Post last modified:July 20, 2011
  • Post category:Cyberwar/Security
  • Post comments:6 Comments
  • Reading time:4 mins read
  • Post published:July 20, 2011

Probably LOIC is not so safe as it was supposed to be. Yesterday FOX News (curiously the American province of…

Continue ReadingSomeone has been arrested for using LOIC

The LulzSec Boat is Back (and sails under The SUN)

  • Post author:
  • Post last modified:July 19, 2011
  • Post category:Security
  • Post comments:5 Comments
  • Reading time:3 mins read
  • Post published:July 19, 2011

The storm which hit the media empire of Rupert Murdoch has rapidly spread over the web. Yesterday night I was…

Continue ReadingThe LulzSec Boat is Back (and sails under The SUN)

Lady Gaga Web Site Hacked

  • Post author:
  • Post last modified:July 17, 2011
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:3 mins read
  • Post published:July 17, 2011

Image via Wikipedia This sunny July morning begins with another resounding hacking notification. This time is Lady Gaga's turn, whose…

Continue ReadingLady Gaga Web Site Hacked

Phonarchy in the U.K.

  • Post author:
  • Post last modified:July 15, 2011
  • Post category:Mobile/Security
  • Post comments:1 Comment
  • Reading time:7 mins read
  • Post published:July 15, 2011

It looks like that the Perfidious Albion is not what one should exactly define a Paradise for Mobile Security. Not…

Continue ReadingPhonarchy in the U.K.

The Mother Of All Breaches

  • Post author:
  • Post last modified:July 15, 2011
  • Post category:Cyberwar/Security
  • Post comments:6 Comments
  • Reading time:5 mins read
  • Post published:July 15, 2011

Update July 15: Reuters reports that hat a classified US military weapons system will now need to be redesigned after…

Continue ReadingThe Mother Of All Breaches
  • Go to the previous page
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • 13
  • Go to the next page
Copyright 2022 - HACKMAGEDDON.COM