DMA Attack and what it does
A DMA attack is a type of side channel attack in computer security, in which an attacker can penetrate a computer or other device, exploiting the presence of high-speed expansion…
Countries with greatest cybercrime power
Cyberterrorism is a reality against which companies and governments around the world have been fighting for several years. The attacks are mainly focused on the financial, energy and telecommunications sectors.…
Hijacking is a dangerous type of Cyberattack
Hijacking is a type of computer attack in which hackers are able to modify the redirection of DNS servers. This what it does is when a user wants to enter…
Anonymous – The history and its events
Since 2003, Anonymous has grown as a decentralized organization called “hacktivists” who use computer attacks to obtain confidential information that may be of public interest or to promote various protests.…
Unix – The father of our beloved Linux
The history of Unix begins at AT&T Bell Labs in the late 1960s with a small team of programmers looking to write a multi-tasking, multi-user operating system for the PDP-7.…
Wikileaks – One of the biggest data breaches
The Wikileaks case, for which Chelsea Manning was sentenced to 35 years in prison, was at the time the largest leak of secret US documents in history. Private Manning, then…
Wiper – One of the most dangerous viruses
Wiper is one of the most harmful computer viruses that we can find on the Internet. If the name does not sound familiar to you, surely due to some of…
Evil Twin – An attack aimed at stealing user’s data
The Evil Twin attack consists of creating a trap access point. The purpose of the attack is to redirect the user to a trap website, in which the user will…
ENISA – Agency of expertise in Cybersecurity
ENISA, the European Union Agency for Cybersecurity, is a center of expertise for Cybersecurity in Europe. ENISA helps the EU and its member countries to be better equipped and prepared…
IoT Botnet Attacks – A problem for Cybersecurity
This raises is one that many in the security industry have been asking the most. Internet of Things (IoT) botnet are cross systems of connected devices with security flaws –…