Blog Posts Tagged with "Anonymous"
Anonymous Claims Department of Justice Hack, Data Dump
May 22, 2012 Added by:Headlines
"The department is looking into the unauthorized access of a website server operated by the Bureau of Justice Statistics that contained data from their public website. The... website has remained operational throughout this time. The department’s main website... was not affected..."
Comments (0)
Is Lord Sugar a Member of Anonymous?
May 18, 2012 Added by:Javvad Malik
I’m simply asking the question that if Lord Sugar read something he didn’t agree with, and instead of privately sharing his thoughts or being in any way constructive, why did he expose the email address of Kevin OSullivan and invited 2 million people to DDoS his inbox?
Comments (0)
Not Totally Sure What Just Happened...
May 16, 2012 Added by:ʞɔopuooq ʇuıɐs
As I watched, the conspiracies mounted – one of my favorites is that Smedley is in fact me and I am cashing out or something, so I decided to up the ante. I (probably stupidly in hindsight) unpublished my blog posts and deactivated my twitter to lend credibility to Smedley's claims...
Comments (1)
Has Anonymous Infiltrated the US Government?
May 16, 2012 Added by:Plagiarist Paganini
"Right now we have access to every classified database in the U.S. government. It’s a matter of when we leak the contents of those databases, not if. You know how we got access? We didn’t hack them. The access was given to us by the people who run the systems…"
Comments (6)
The Pirate Bay Labels DDoS Attacks as Censorship
May 09, 2012 Added by:Headlines
Critics of DDoS attacks conducted by movements like Anonymous have long held that it is hypocritical to profess the defense of free speech by engaging in a tactic that undermines one's right to freely communicate, whether the interest is sociopolitical or an effort to engage in commerce...
Comments (0)
Anonymous Reloaded: Yesterday, Today, and Tomorrow
May 04, 2012 Added by:Plagiarist Paganini
Anonymous must be analyzed with a multidisciplinary approach, it is an amorphous creature that quickly changes and is able to adapt its behavior to the context needed for successful attacks, thanks to the large and heterogeneous participation in its collective...
Comments (0)
China vs. Philippines: Cyberwar or Hacktivism?
May 03, 2012 Added by:Plagiarist Paganini
While attention is focused on Iran and its quarrel with the West, other silent battles are being fought. In the last month, there has been a surprising level of activity between China and the Philippines, with reciprocal attacks via bits and bytes. Are we witnessing a cyber conflict?
Comments (0)
Building a Better Anonymous: Separating the Philosophical from the Practical
April 18, 2012 Added by:Infosec Island Admin
Boiling it down to a simplistic statement, “Anonymous” - which means “unknown” - cannot at any time ever be considered a movement/group/collective that will never be used as a scapegoat for bad actors. Nor will it ever mean that bad actors will never get into the fold...
Comments (0)
Patriot Hackers: Stand YOUR Ground - Not Mine
April 16, 2012 Added by:Ali-Reza Anghaie
Let’s not replicate the sins of our Governments. Let’s not aggravate the problems Governments face. I don't disregard the threats radicalization online brings. I'm suggesting Cyber Vigilantism is not a movement we want to support by throwing our Western weight behind it...
Comments (21)
Transcript: Patriot Hacker th3j35t3r Addresses USM Students
April 10, 2012 Added by:Anthony M. Freed
The hacktivist opened himself up to questions regarding his operations, methodologies and motivations - including his campaigns against radical militant websites, his take down of WikiLeaks, his tussles with Anonymous, his military service, and a variety of security issues...
Comments (4)
Infosec: The Eternal Struggle
April 06, 2012 Added by:Infosec Island Admin
The military and the government movers and shakers are all moving with fear tinged with desire, for more control over the internet as a whole while the beltway bandits are all in the wings, like a murder of crows watching dark eyed, waiting for their moment to strike...
Comments (0)
The First Cyber Shot in a Chinese Jasmine Spring
April 01, 2012 Added by:Joel Harding
This does not look like a US military action against China, that is certain. Whoever put the message together seems to be dumbing it down to aid in translation. It’s as if it’s intended for an American audience, but nobody in their right mind would or should do that...
Comments (0)
Authorities Apprehend the Hacktivist Known as th3j35t3r
March 31, 2012 Added by:Infosec Island Admin
In a shocking turn of events, the hacktivist known as th3j35t3r has been identified as Robert "Lance" Miller from Pittsboro, North Carolina. Mr Miller is now in police custody after the multi-agency operation took place in the early hours of the morning on April 1st, 2012...
Comments (8)
Just One of the Reasons Why I Love Anonymous
March 28, 2012 Added by:Quintius Walker
In the world of cyber-security things transform at the speed of light. From exploits to methods, what worked yesterday is not the solution tomorrow. Ethical problem solving students should do themselves a favor and study the ways of the infamous idea known to us as Anonymous...
Comments (0)
Can DNS Attacks Threaten the Internet on a Large Scale?
March 27, 2012 Added by:Alan Woodward
This attack is theoretically possible because the DNS is a hierarchy. At the top level are 13 servers. Disrupt them and you could disrupt the entire DNS network. Authorities know this and they put a lot of effort into ensuring that the DNS network can cope with a DOS attack...
Comments (3)
Who Fights for the Users? Part II: FBI's AntiSec
March 15, 2012 Added by:Ali-Reza Anghaie
News is rampant with speculation that the FBI created AntiSec as a sting operation. I'm going to a further extreme to explore this - yes, conspiratorial. Cans of conspiracy worms get opened and they can't ever be closed. Something Government should strive to avoid...
Comments (2)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization