Blog Posts Tagged with "Black Hat"

Default-avatar

Gen. Alexander Can’t Access Daughters' Emails, Says NSA Only Interested in Terrorists

August 01, 2013 Added by:Joe Franscella

On Wednesday, National Security Agency (NSA) Director General Keith Alexander informed a rather tame crowd (with the exception of one or two hecklers) that his agency isn’t interested in phone or other digital communications unless they impact foreign intelligence gathering or involve known or suspected terrorists. A day later a couple’s home was raided after the husband and wife searched “p...

Comments  (0)

306708aaf995cf6a77d3083885b60907

R.I.P. Barnaby Jack: Famed Hacker Dies Days Before Black Hat Conference

July 26, 2013 Added by:Mike Lennon

Well known hacker Barnaby Jack has passed away, sending a shock through the security community with the biggest hacker-focused security conference of the year just days away.

Comments  (0)

6d117b57d55f63febe392e40a478011f

BSidesLV Preview: Wireless Pen Testing and Assessments

July 10, 2013 Added by:Anthony M. Freed

Security BSides Las Vegas is just around the corner, and we have had a great time reviewing some of the sessions and speakers that will make up this epic event.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Fifty Shades of Grey Hat: Hacking and Ethics

September 19, 2012 Added by:Tripwire Inc

The grey hat is more interested in the “how” than the “why”. There is a respect for the black hat's technical abilities, while keeping a wary eye on them. Some grey hats have had run ins with the law, not due to being malicious, but because curiosity got the best of them...

Comments  (1)

888605c6c25c19e41bbbb986ea6d43c1

Top Hats For Everyone!

September 11, 2012 Added by:Jim Palazzolo

If you give public attention to your adversary, the stronger they get. We keep using terms like “Hacker” and “Black Hat”. I understand the need to classify the behavior. However, are we inadvertently giving individuals too much inherited power by recognizing them in context and connotation?

Comments  (2)

4bc4991ebc3bd722765f157c77924e7a

Rebooting Infosec Cons

July 31, 2012 Added by:Dan Klinedinst

I just got home from the "Vegas week" of Black Hat, BSidesLV, and DefCon. I love many things about each, and each has things I wish they'd do better. This is true of all the conferences I've attended. However, a few questions are lingering in my mind after Vegas, possibly due to the effects of sleep deprivation...

Comments  (0)

59da131e1207b6fadf8fec3862d85ad1

Black Hat and BSides Las Vegas: The Enemy Within

July 30, 2012 Added by:alan shimel

There was a time that Black Hat was where the edge met the establishment, but Black Hat has gone totally corporate and seems to have lost the edge. All of the edge seems to have gone to BSides. I love both Black Hat and BSides and think each needs a little bit of what the other has to be whole, viable and successful...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

The Color of Intent

May 17, 2012 Added by:Jayson Wylie

If I said "hacker", everyone knows what goes along with that, and the audience may be impressed or annoyed depending on their fanfare or if they have been victimized. People still think hacker when they hear "pentester" and do not believe the in the existence of pure "white hats"...

Comments  (1)

4ff49873e3fed9a24adf0d37ae00b780

It's Summer Blockbuster Season Again - Time to get Prepared

May 08, 2012 Added by:Lee Munson

One of the most used tricks that black hat hackers use during this time of year is to piggyback off of the advertising of big budget movies. There are a lot of ways that you can leverage attacks with this type of advertising and believe me they use all of them...

Comments  (0)

94c7ac665bbf77879483b04272744424

Ethical or Unethical Hacker?

May 01, 2012 Added by:Marc Quibell

Right there as top IT News was an article on how to pwn a Hotmail account. It was a 0-day exploit, which meant no one at Microsoft was notified. It was written by a self-described ethical hacker. Naturally my first reaction was, "Ya right"...

Comments  (11)

0a8cae998f9c51e3b3c0ccbaddf521aa

Doing Biz with Hackers: Do Bad Guys Make the Best Good Guys?

March 06, 2012 Added by:Rafal Los

The significance of quality talent can't be overlooked - having a second-rate individual watching your virtual piggy-bank is as good as having none. It's not like there are thousands of ex-con hackers out there looking for work - but I suspect there are more than you think...

Comments  (3)

F29746c6cb299c1755e4087e6126a816

A Hacker Handbook: Who Are the Bad Guys?

January 19, 2012 Added by:Kelly Colgan

When the Internet was a baby, hackers were fairly homogeneous. Some were scamming businesses for personal gain, but most were simple graffiti artists – breaking into websites to splash some MS Paint. It was a way to rebel and earn credibility within the computer community...

Comments  (1)

8c4834b99847b9f7c9ee94b45df086f9

Hackers: The Good, the Bad and the Ugly

November 07, 2011 Added by:Emmett Jorgensen

Hackers are often portrayed as social outcasts or criminals looking to defraud the unsuspecting public. The media frequently makes little or no distinction between hacker types, simply lumping them all together into a malevolent group. The truth is hackers come in all shapes and sizes...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Ten History-Making Hackers Who Shaped Technology

September 14, 2011 Added by:Headlines

The ensemble is somewhat surprising - a collection of both white and black hat innovators who's activities often landed them on either side of the law, but who nonetheless had a tremendous impact on information technology as we know it today...

Comments  (0)

4ff49873e3fed9a24adf0d37ae00b780

One in Four Cyber Criminals Turn In Their Friends

June 26, 2011 Added by:Lee Munson

You are not going to find much sympathy by most people since you are out there doing something illegal. So you must be just like the rest of the criminal world and prepare to live your life by trusting very few people and always be aware that anyone can turn on you...

Comments  (4)

37d5f81e2277051bc17116221040d51c

Seven Types of Hacker Motivations

March 25, 2011 Added by:Robert Siciliano

Governments around the globe realize that it serves their military objectives to be well positioned online. The saying used to be, “He who controls the seas controls the world,” and then it was, “He who controls the air controls the world.” Now it’s all about controlling cyberspace...

Comments  (0)

Page « < 1 - 2 > »