Cyberattack Stories

42 Stories

A Book Full of AvA: CyberAttack Asks by a_user_or_something
#1
A Book Full of AvA: CyberAttack As...by a_user_or_something
Since I've been doing asks on Tumblr, why not upload them here? (For context for these, please read other CyberAttack books!❤️)
Kali Linux Tools by HelpfulCyberCop
#2
Kali Linux Toolsby HelpfulCyberCop
Kali Linux is a renowned version of Linux Operating System
Echoes of Dissonance: A Requiem for Tomorrow by LewisNasvlach
#3
Echoes of Dissonance: A Requiem fo...by lewis
What if : In "Echoes of Dissonance: A Requiem for Tomorrow," a group led by Ted Kaczynski challenges the growing reliance on technology. Starting in a remote c...
World War Hacker  by Techn0master
#4
World War Hacker by
Set in an alternate Early 21st Century, somewhere around the late 90s and early 2000s, Machines are created to help humans and to provide care and aid. But then, on Marc...
Catch Me If You Can by KyraZimmermann
#5
Catch Me If You Canby Kyra Z
Over a hundred years into the future, the anonymous hacker Glitch terrorizes American Empire servers and leaks confidential government secrets onto public websites. Of c...
Tips to Protect Your Android Device From Ransomware Attack by alicewhite07
#6
Tips to Protect Your Android Devic...by Alice White
Mobile Ransomware attack is a type of malware that blocks your android device and demands ransom to restore access. The first thing to protect from ransomware attack, yo...
What is Cybercrime and Protect Yourself Against Them by alicewhite07
#7
What is Cybercrime and Protect You...by Alice White
Cybercrime is any illegal activity that involves a computer, networked device or a network. Most cybercrimes are carried out in order to generate profit for the cybercr...
The Blue Light Project by Arinthos
#8
The Blue Light Projectby Arinthos
The Blue Light project was launched by a secret organisation to further their dominance on the world. However things took a quick turn when the lead of project, Ajay had...
Completed