Anonymous – The history and its events
Since 2003, Anonymous has grown as a decentralized organization called “hacktivists” who use computer attacks to obtain confidential information that may be of public interest or to promote various protests.…
Cloud Server and Hosting Tutorials, News and Tricks
Since 2003, Anonymous has grown as a decentralized organization called “hacktivists” who use computer attacks to obtain confidential information that may be of public interest or to promote various protests.…
The Wikileaks case, for which Chelsea Manning was sentenced to 35 years in prison, was at the time the largest leak of secret US documents in history. Private Manning, then…
Wiper is one of the most harmful computer viruses that we can find on the Internet. If the name does not sound familiar to you, surely due to some of…
The Evil Twin attack consists of creating a trap access point. The purpose of the attack is to redirect the user to a trap website, in which the user will…
ENISA, the European Union Agency for Cybersecurity, is a center of expertise for Cybersecurity in Europe. ENISA helps the EU and its member countries to be better equipped and prepared…
This raises is one that many in the security industry have been asking the most. Internet of Things (IoT) botnet are cross systems of connected devices with security flaws –…
The threat of negative SEO is remote but overwhelming. Negative SEO is a set of activities aimed at lowering a competitor’s ranking in search results. These activities are usually off…
Browser extensions are applets within a browser that add functionality. Commonly used extensions are, for example, Adblockers, Colorpickers, CRM integrations, Microsoft Office (Word, Excel, Powerpoint editing in your browser), password…
The encrypted virus is a computer virus that encrypts its payload with the intention of making it difficult to detect the virus. However, because anything encrypted requires a decryptor or…
Many times we users can find that we cannot access a computer on our network, a website, a resource on the network, etc. That is why one of the most…