Soluzioni per l'analisi della Sicurezza Informatica
  • ISGroup Independent Research [EN]
  • ISGroup Partner per la sicurezza [IT]
  • August 28, 2013

    Nasdaq crash triggers fear of data meltdown

    Nasdaq crash triggers fear of data meltdown: A series of system crashes affecting Google, Amazon, Apple and Microsoft in the past fortnight has brought warnings that governments, banks and big business are over-reliant on computer networks that have become too complex. The alarm was sounded by industry experts in the aftermath of a three-hour network shutdown […]

  • August 28, 2013

    World’s Biggest Data Breaches & Hacks

    A really interesting data-set published today on Information is Beautiful: Data visualization of the world biggest data breaches, leaks and hacks. Click on the image to access the live page or download the static version here!

  • August 27, 2013

    Millions stolen from US banks after ‘wire payment switch’ targeted

    Millions stolen from US banks after ‘wire payment switch’ targeted: Criminals have recently hijacked the wire payment switch at several US banks to steal millions from accounts, a security analyst says. Gartner vice president Avivah Litan said at least three banks were struck in the past few months using “low-powered” distributed denial-of-service (DDoS) attacks meant to divert the […]

  • August 27, 2013

    Hacker accuses US government of tricking Anonymous into attacking foreign targets

    Hacker accuses US government of tricking Anonymous into attacking foreign targets: Just as a former member of Anonymous accuses the United States government of coercing hackers to do their dirty work in America’s cyberwars, the sentencing hearing for the group’s alleged ex-ringleader has been mysteriously delayed yet again. One day after a statement was released by […]

  • August 26, 2013

    Meganet’s Dominator I snoops on four GSM convos at once, fits in your overnight bag

    Meganet’s Dominator I snoops on four GSM convos at once, fits in your overnight bag: “Dominator I” sounds more like a monster truck than a collection of small boxes that collectively erase 20 years of relatively secure wireless phone service, doesn’t it? Alas, what you’re looking at here is a convenient, plug-and-play solution for exploiting the […]

  • August 26, 2013

    Moscow Subway To Use Devices To Read Data On Phones

    Moscow Subway To Use Devices To Read Data On Phones: The head of police for Moscows subway system has said stations will soon be equipped with devices that can read the data on the mobile telephones of passengers. In the July 29 edition of “Izvestia,” Moscow Metro police chief Andrei Mokhov said the device would be […]

  • August 22, 2013

    Julian Assange: Two Years of Cablegate as Bradley Manning Testifies for the First Time

    Two Years of Cablegate as Bradley Manning Testifies for the First Time: Thursday, November 29th, Bradley Manning testified for the first time since his arrest two and a half years ago in Baghdad. Today also marks the two-year anniversary of the first front pages around the world from Cablegate, an archive of 251,287 U.S. State Department […]

  • August 5, 2013

    UN responds to NSA hacking reports

    The United Nations said Monday that it will contact the United States about reports that the National Security Agency hacked UN internal communications, and the world body emphasized that international treaties protect its offices and all diplomatic missions from interference, spying and eavesdropping.

  • August 4, 2013

    So Dropbox Can Be Hacked

    We describe a method to bypass Dropbox’s two-factor authentication and hijack Dropbox accounts. Additionally, generic techniques to intercept SSL data using code injection techniques and monkey patching are presented.

  • August 4, 2013

    Tor usage doubles since NSA PRISM scandal

    Usage of a semi-secret U.S. government-created Internet network increased in recent days amid continuing revelations about secret U.S. government spy programs.

Categories

  • Hacks and Incidents
  • Security News
  • Security Techniques
  • Uncategorized

Copyright © 2025 by ISGroup SRL - All Rights Reserved