Cyberattack Stories

42 Stories

A Book Full of AvA: CyberAttack Asks by a_user_or_something
#1
A Book Full of AvA: CyberAttack As...by a_user_or_something
Since I've been doing asks on Tumblr, why not upload them here? (For context for these, please read other CyberAttack books!❤️)
World War Hacker  by Techn0master
#2
World War Hacker by
Set in an alternate Early 21st Century, somewhere around the late 90s and early 2000s, Machines are created to help humans and to provide care and aid. But then, on Marc...
Harassment and Open Vandalism by ThE_Road_LesS_takeN-
#3
Harassment and Open Vandalismby がんばれ
Here are the proof that some druggy lunatics who desperately seek attention and want it at any cost are manipulating my friends and Readers alike. They know no bounds. T...
How Supply Chain Attacks Could Be Compromising Your Business by Bornsec
#4
How Supply Chain Attacks Could Be...by Bornsec
What is a Supply Chain Attack? A supply chain attack is a sophisticated cyber threat that targets the weakest points within a network of suppliers and partners to gain u...
CYBER by Etamateni
#5
CYBERby Etamateni Æ Monetes
William Haka, usually considered as the most wisest child ever born. Due to his extremely talented gifts, many sought to own that gift. Even though he is just a boy, he...
Monopoly of Thought by Quor000
#6
Monopoly of Thoughtby Quor
Retired NSA agent Stone and his paraplegic wife Dakota wake up one morning to discover someone's deposited over $100,000 into their bank account. Investigating the cause...
Echoes of Dissonance: A Requiem for Tomorrow by LewisNasvlach
#8
Echoes of Dissonance: A Requiem fo...by lewis
What if : In "Echoes of Dissonance: A Requiem for Tomorrow," a group led by Ted Kaczynski challenges the growing reliance on technology. Starting in a remote c...
3 Ways to Find A Malicious Website by robertbrooks07
#9
3 Ways to Find A Malicious Websiteby Robert Brooks
An unsafe or malicious infected website can spread malware, steal your information, send spam, and more. To protect yourself and your website information, it's important...
BEHIND THE FILES: "1" by TheSecretCompanyOrg
#10
BEHIND THE FILES: "1"by TheSecretCompanyOrg
"Behind the Files" follows cybersecurity expert Alex Mercer and Detective Sarah Collins as they uncover disturbing files on a company's server linked to a seri...
What is Cybercrime and Protect Yourself Against Them by alicewhite07
#11
What is Cybercrime and Protect You...by Alice White
Cybercrime is any illegal activity that involves a computer, networked device or a network. Most cybercrimes are carried out in order to generate profit for the cybercr...