Steganography: How to hide data in images and extract them
In this article, we will put these concepts into practice by demonstrating how to utilize Steghide and Stegosuite, two tools available for Linux users.
MafiaBoy, the hacker who took down the Internet
Write up: Detect malicious hacker activities on endpoints
How ILOVEYOU worm became the first global computer virus pandemic
Stuxnet – A weapon made out of code that almost started WW3
Rafael Núñez (aka RaFa), hacking NASA with the hacking group: World of Hell
Operation Troy – How researchers linked the cyberattacks
Operation Aurora: When China hacked Google
The first botnet hijacker aka the Zombie King
Jeanson Ancheta didn’t have the usual path that many hackers had in the old days but he carved his path through the use of his botnet army. This is the story of the first person to plead guilty to federal charges of hijacking computers for profit.