Hacking In The Time of Twitter

  • Post author:
  • Post last modified:August 5, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:3 mins read

So, after announcing an alleged hack to Italian Prison Guards, the threatening tweets anticipating the latest hack, have suddenly disappeared…

Continue Reading Hacking In The Time of Twitter

The Two Faces of Hacking

  • Post author:
  • Post last modified:July 20, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:3 mins read

My colleague Massimo Biagiotti suggested me this interesting matrix from IEEE which originally indicated some of the biggest and best…

Continue Reading The Two Faces of Hacking

The Mother Of All Breaches

  • Post author:
  • Post last modified:July 15, 2011
  • Post category:CyberwarSecurity
  • Post comments:6 Comments
  • Reading time:3 mins read

Update July 15: Reuters reports that hat a classified US military weapons system will now need to be redesigned after…

Continue Reading The Mother Of All Breaches