Blog Posts Tagged with "Hacker"

37d5f81e2277051bc17116221040d51c

Cross-Site Scripting and Criminal Hacks

December 14, 2010 Added by:Robert Siciliano

JavaScript is everywhere, making the Internet pretty and most websites user friendly. Unfortunately, hackers have learned to manipulate this ubiquitous technology. Java can be used to launch a cross-site scripting attack, leveraging a vulnerability found in applications that incorporate Java...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Universities Produce Paydirt for Criminal Hackers

December 13, 2010 Added by:Headlines

Criminal hackers have found Universities to be a prime target in their efforts to amass confidential details that can be employed in identity theft rackets. According to a report by AppSec, 2.3 million records have been illegally accessed at 158 institutions in the United Sates since 2008...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Moneybookers Now Targeted by DDoS Attacks

December 10, 2010 Added by:Headlines

Moneybookers, the online payment company who ended their business relationship with WikiLeaks in August, is now the subject of distributed denial of service attacks by WikiLeaks sympathizers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Operation Payback and 4chan Hit MasterCard - Twitter Is Next

December 08, 2010 Added by:Headlines

The hacker social network 4chan and Operation Payback are engaged in a flurry of DDoS in retaliation for any actions they deem intended to limit WikiLeaks operations. MasterCard is being targeted today, and a message on the 4chan forums indicates that the next target is Twitter...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hackers Threaten WikiLeaks Detractors - Bank Suspends Account

December 06, 2010 Added by:Headlines

While some service providers are thinking that it was a mistake to do business with the rogue whistleblowing organization WikiLeaks, they may also want to think twice before cutting ties. International hacker communities are threatening to target business that take actions to stifle the data dumps...

Comments  (1)

6d117b57d55f63febe392e40a478011f

Did WikiLeaks Hacker The Jester Pull Police Raid Hoax?

December 02, 2010 Added by:Anthony M. Freed

The Jester was angry enough with militants recruiting for jihad and about the WikiLeaks disclosures to launch a DoS attacks on their sites, so why was he not very peeved about an impostor using his name to scam money? The logical conclusion might be that The Jester himself is the hoaxer...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Hacker "The Jester" Reports Raid By Law Enforcement

December 01, 2010 Added by:Headlines

There are unconfirmed reports that infamous anti-jihadi hacker The Jester (th3j35t3r), who earlier this week claimed responsibility for a denial of service attack that temporarily disabled the WikiLeaks website, was the subject of a search and equipment seizure by law enforcement...

Comments  (3)

6d117b57d55f63febe392e40a478011f

WikiLeaks Suffers a Second More Powerful DoS Attack

November 30, 2010 Added by:Anthony M. Freed

The WikiLeaks Twitter account displays the messages, "We are currently under another DDoS attack," and "DDoS attack now exceeding 10 Gigabits a second," which dwarfs the 2-4 Gbps attack perpetrated by self-proclaimed "patriot hacker" known only as The Jester (th3j35t3r)...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Mafiaboy Sees Security Problems for Cloud Computing

November 28, 2010 Added by:Headlines

Michael Calce, who gained fame a decade ago for his denial of service attacks (DoS) that took down the websites of giants like Yahoo and and Amazon, says vulnerabilities are inherent in the cloud computing model and that hackers will take advantage at a great cost to businesses...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

People Remain the Number One Threat to Security

November 21, 2010 Added by:Headlines

All the security, training, planning and education in the world can not seem to defend against the human element, and this fact presents the single largest obstacle to security for individuals, enterprise, and government. Here are just a few examples from this week alone...

Comments  (0)

Page « < 1 - 2 - 3 > »