Quantcast
Channel: Hackmageddon.com » Northrop Grumman
Browsing latest articles
Browse All 14 View Live

Image may be NSFW.
Clik here to view.

2011 Cyber Attacks (and Cyber Costs) Timeline (Updated)

Update: Cyber Attacks Timeline Update for July 2011 As already suggested, I considered the original 2011 Cyber Attacks Timeline graph by Thomson Reuters not enough complete since it did not show some...

View Article



Image may be NSFW.
Clik here to view.

Another One Bytes The Dump

Update July 12: Booz Allen Confirms Illegal Attack on Information Technology System It looks like that security issues for US Military contractors never end. The consulting firm Booz Allen Hamilton is...

View Article

Image may be NSFW.
Clik here to view.

The Mother Of All Breaches

Image via Wikipedia Update July 15: Reuters reports that hat a classified US military weapons system will now need to be redesigned after specs and plans for the system were stolen from a defense...

View Article

Image may be NSFW.
Clik here to view.

The Two Faces of Hacking

My colleague Massimo Biagiotti suggested me this interesting matrix from IEEE which originally indicated some of the biggest and best stories assessed along two dimensions: innovation and impact....

View Article

Image may be NSFW.
Clik here to view.

Antisec hacks another Defense Contractor

Update August 19: As part of #FFF IV Antisec has released full torrent for Vanguard Defense Industries Hack. The Antisec Typhoon seems unstoppable and has apparently hacked another Defense Contractor....

View Article


Image may be NSFW.
Clik here to view.

Finally I Saw One!

Update: F-Secure posted in their blog the complete description on how the patient 0 was found: And here it is the infamous “2011 recruitment plan message”. Have a look to the fake sender: a message...

View Article

Image may be NSFW.
Clik here to view.

Phoning Home to China

A couple of weeks ago, during the RSA Conference in London, Tom Heiser, president of RSA declared that two separate hacker groups already known to authorities were behind the serious breach affecting...

View Article

Image may be NSFW.
Clik here to view.

The China Cyber Attacks Syndrome

A week ago, the Office of the National Counterintelligence Executive published a report to Congress concerning the use of cyber espionage to attempt to gain business and industrial secrets from US...

View Article


Image may be NSFW.
Clik here to view.

One Year Of Lulz (Part I)

Update December 26: 2011 is nearly gone and hence, here it is One Year Of Lulz (Part II) This month I am a little late for the December Cyber Attacks Timeline. In the meantime, I decided to collect on...

View Article


Image may be NSFW.
Clik here to view.

Exclusive Infographic: All Cyber Attacks on Military Aviation and Aerospace...

Cross Posted from TheAviationist. 2011 has been an annus horribilis for information security, and aviation has not been an exception to this rule: not only in 2011 the corporate networks of several...

View Article

Image may be NSFW.
Clik here to view.

Another Breach In The Wall

Image by gpjt via Flickr Hard Times to come for U.S. Defense Contractors: it looks like each new day reveals information of a new cyber-attack to military technology companies using (alleged)...

View Article

Image may be NSFW.
Clik here to view.

Seeds On Sale?

Image via Wikipedia With the alleged Northrop Grumman Cyber-attack, we have experienced three attempts, unleashed in few days, to leverage the compromised RSA seeds in order to steal data from U.S....

View Article

Image may be NSFW.
Clik here to view.

2011 CyberAttacks Timeline

Update June 29: 2011 Cyber Attacks (and Cyber Costs) Timeline (Updated) I found this interesting graph from an original Thomson Reuters post, showing the timeline of the major 2011 CyberAttacks. The...

View Article


Image may be NSFW.
Clik here to view.

Fortune 500 Cyber Attacks Timeline

For the Infosec professionals, this troubled 2014 will be remembered for the trail of gigantic breaches unleashed nearly exactly one year ago, when the real outcome of the infamous Target breach became...

View Article
Browsing latest articles
Browse All 14 View Live




Latest Images