Information security goes non-binary
Finding security holes in information systems is as old as the first commercially available computer. Back when a “computer” was something that sat in a computer room, users …
Blast from the infosecurity past: February 2006 edition
Help Net Security has been online since 1998. Practically run by a core team from back then, we are still covering the latest trends in the information security arena. …
The history of cyber attacks: From ancient to modern
In the 1990s, your typical hacker’s approach used to be “hit-and-run”, and in many cases it was about fame and recognition. Back in those days most organizations only had a …
Top April Fools’ Day hoaxes throughout history
April Fools’ Day is a time for practical jokes, hoaxes and laughs. However, it’s important to understand that April Fools’ Day is also an ample opportunity …
The History Of Hacking
Nowadays, different people have different views on the hacking scene. Often times people of similar skill level have similar opinions. There is no official definition of a …
The History of Hacking and Phreaking
-=-=-=-=-=- Okay boys and girls, children of all ages…Here’s a revolutionary idear….The announcements foist! -=-=-=-=-=- The file we released on smashing up …
Featured news
Sponsored
Don't miss
- EU adopts Cyber Resilience Act to secure connected products
- DORA regulation’s nuts and bolts
- Unlocking the power of cryptographic agility in a quantum world
- Actively exploited Firefox zero-day fixed, update ASAP! (CVE-2024-9680)
- Internet Archive data breach, defacement, and DDoS: Users’ data compromised