Can you be hacked through a picture? Image Steganography

Steganography, where "steganos" is Greek and stands for "hidden" or "covered," and "graph" stands for "to write", refers to the art and science of communicating in a way that hides the existence of communication. It differs from cryptography as in cryptography, there is visible information that cannot be understood without a key, whereas in steganography,... Continue Reading →

Huge Australian health hack exposes sensitive data

One of the major suppliers to the Australian insurance industry, Medibank, was the target of a cyberattack on November 11, 2022. Extremely private information about patients was made public during the disastrous occurrence. On October 20, 2022, hackers launched their first attack against Medibank, successfully gaining access to the personal data of 9.7 million customers.... Continue Reading →


Ransomware is a type of malware that locks down files, data or systems, and threatens to erase or destroy the data - or make private or sensitive data to the public - unless a ransom is paid to the cybercriminals who launched the attack. Recent ransomware attacks have targeted state and local governments, which are easier... Continue Reading →

Dropbox Phishing Attack

NEWS Millions of people around the world use Dropbox to store their files in a secure location on the cloud. On November 1st however, the security of the file hosting software became compromised after hackers successfully pulled off a series of phishing attacks on Dropbox employees granting them access into Dropbox’s system. The company revealed... Continue Reading →


Cisco published a guide, made of 5 tips useful to prevent and combat one of the most powerful and dangerous cyber threats: Phishing.  The Cisco objective is to raise awareness and alert both people and companies in order to avoid possible attacks, helping to contrast the spread of vulnerabilities exploitable from attackers. Phishing attacks consist... Continue Reading →

How Hackers Can Steal Your Car 

On Monday, the European Union Agency for Law Enforcement Cooperation halted a hacking attack which targeted vehicles with keyless entry. The hackers had managed to replace the software of the cars pretending to install an automotive diagnostic solution, and they were thus able to unlock the cars, start the engine and drive away. Europol eventually... Continue Reading →

The psychological consequences of cyberattacks: an IBM study

IBM says that ransomware attacks harm incident responders psychologically.  According to a survey conducted by IBM and Morning Consult, hundreds of cybersecurity incident responders indicated ransomware attacks have a significant impact on their mental health. Incident response indicates the activity of immediately identifying an attack lessens its effects, confines the damage, and addresses the root... Continue Reading →


On January 17th, 2022 learned that a small number of users had unauthorized crypto withdrawals on their accounts. Later during the day hundreds of users were hit and it became clear that it wasn’t just an unauthorized withdrawal phenomenon that they were witnessing but that a cybersecurity breach had occurred in their systems. INCIDENT... Continue Reading →

Create a website or blog at

Up ↑