Facebook
Linkedin
Twitter
Youtube
Tech News
CIO
Resources
Technology Jobs
Reports and Whitepapers
News for CIOs
CIO Census
Digital Security Zone
Webinar Highlight Reports
Roundtable Highlight Reports
2023 IT Salary Calculator
AI Directory
ITWC Talks
Featured Partner Content Hubs
Digital Magazines
Senior Contributors
Events
PAST EVENTS
Technicity GTA
CIO OF THE YEAR
CDN Channel Innovation Awards
Digital Transformation Conference and Awards
Canada’s Top Women in Cybersecurity
CDN Top Women in the Channel
MapleSEC
Analytics Unleashed
All IT World Canada Events
Videos
President to President
All Tech Videos
Podcasts
Cyber Security Today
Hashtag Trending
Leadership in the Digital Enterprise
CMO Talks
All Hands on Tech Video Podcast Series
Deeper Dive
ITWC Podcast Network
Engage
Contributor Opportunities
Gartner Corner
About Us
Privacy Policy
Contact Us
Search
NewsPaper
Facebook
Linkedin
Twitter
Youtube
DXAwards
CIO of The Year
Leadership
News for CIOs
Analytics Unleashed
Technicity
Emerging Tech
IT World Canada
Tech News
POPULAR CATEGORIES
Emerging Tech
24490
Security
8749
Infrastructure
8593
Government & Public Sector
6289
IoT
6187
Content Types
Videos
Â
Podcasts
Blogs
Slideshows
ALL CATEGORIES
Artificial Intelligence
(1496)
Blockchain
(182)
CanadianCIO
(107)
Careers & Education
(4484)
Channel Strategy
(0)
ChatGPT 4o
(0)
ClaudeAI
(0)
Cloud
(2213)
Communications & Telecom
(571)
Companies
(1423)
Cox Media
(0)
credit card breach
(0)
Data & Analytics
(1388)
deep fakes
(0)
Development
(907)
Dick's Sporting Goods
(0)
Digital Transformation
(1347)
Distribution
(128)
duck duck go
(0)
Emerging Tech
(24490)
Financial
(195)
FinTech
(115)
FISA
(0)
Future of Work
(414)
GenZ
(0)
Governance
(145)
Government & Public Sector
(6289)
Governor Gavin Newsom
(0)
Great Resignation
(0)
H&R Block
(0)
HashiCorp
(0)
Human Resources
(926)
Humane
(0)
Infrastructure
(8593)
IoT
(6187)
ITWC Morning Briefing
(179)
JustWalkOut
(0)
Leadership
(4359)
Legal
(231)
Legislation
(252)
Managed Services & Outsourcing
(4340)
Mira Murati
(0)
Mobility
(3443)
Octo2
(0)
Operations
(120)
People
(199)
Podcasts
(2604)
Privacy
(810)
Project Management
(1105)
Recall
(0)
Security
(8749)
Sequoia
(0)
Social Networks
(275)
Software
(4228)
Space-X
(0)
Supply Chain
(131)
Sustainability
(171)
Tik Tok
(0)
todayu
(0)
top stories
(1)
Wayback Machine
(0)
Wendy's
(0)
Women in Tech
(209)
You.com
(0)
CIO
Resources
Technology Jobs
Reports and Whitepapers
News for CIOs
CIO Census
Digital Security Zone
Webinar Highlight Reports
Roundtable Highlight Reports
2023 IT Salary Calculator
AI Directory
ITWC Talks
Featured Partner Content Hubs
Digital Magazines
Senior Contributors
Events
PAST EVENTS
Technicity GTA
CIO OF THE YEAR
CDN Channel Innovation Awards
Digital Transformation Conference and Awards
Canada’s Top Women in Cybersecurity
CDN Top Women in the Channel
MapleSEC
Analytics Unleashed
All IT World Canada Events
Videos
President to President
All Tech Videos
Podcasts
Cyber Security Today
Hashtag Trending
Leadership in the Digital Enterprise
CMO Talks
All Hands on Tech Video Podcast Series
Deeper Dive
ITWC Podcast Network
Engage
Contributor Opportunities
Gartner Corner
About Us
Privacy Policy
Contact Us
SUBSCRIBE
Home
Authors
Posts by lucian constantin
lucian constantin
Articles by
lucian constantin
LulzSec leader’s digital trail followed by rival hackers, FBI
lucian constantin
-
March 7, 2012
The story of 'Sabu,' an alleged FBI informant and this week's arrest of five more alleged hackers linked to LulzSec and Anonymous
More malware sneaking through DNS channel: experts
lucian constantin
-
February 29, 2012
Most companies are unprepared to deal with the use of DNS as command and control channel for malware, experts said at the RSA Conference
DDoS attackers start targeting IPv6 networks
lucian constantin
-
February 16, 2012
It had to happen: Criminals are trying to find holds in the IPv6 protocol by launching denial of service attacks
Symantec warns of Android Trojans that mutate with every download
lucian constantin
-
February 3, 2012
The malware contains instructions to automatically send SMS messages to premium-rate numbers from a large number of European and former Soviet Union countriesrn rn
Trojan can hijack smart cards, says researcher
lucian constantin
-
January 18, 2012
Variant of Sykipot can allow it to hijack U.S. defence department and Windows smart cards, says researcher
Wi-Fi brute-force attacks feasible: Researcher
lucian constantin
-
January 2, 2012
Claims flaws in the Wi-Fi Protected Setup (WPS) protocol can make it easier for attackers to obtain access codes for secured wireless network
Logic flaw allows SMS exploit
lucian constantin
-
December 19, 2011
Attackers can exploit that logic flaw to force sending of premium-rate text messages, or lock out message delivery
Industrial espionage gang still active: Symantec
lucian constantin
-
December 13, 2011
The mob that sends malware-laden emails purporting to be from a major security vendor is still going strong, the company saysrn rn
1
2
3
Page 2 of 3
Tech News
New Java-based Web attack discovered
lucian constantin
-
July 10, 2012
Trojan can hijack smart cards, says researcher
lucian constantin
-
January 18, 2012
Hackers publish massive credential list
lucian constantin
-
July 12, 2012
Flame malware self-destructed: Symantec
lucian constantin
-
June 7, 2012
Hackers can bypass MySQL password verification
lucian constantin
-
June 13, 2012