Blog Posts Tagged with "Hacktivist"

7fef78c47060974e0b8392e305f0daf0

Krypt3ia's Rebuttal to th3j35t3r: Oh Jokey…

April 24, 2012 Added by:Infosec Island Admin

I fundamentally disagree with Jester’s method and his goals, as much as they have been explained of breaking their communications. I pretty much explained myself in rather clear, albeit terse, language on several occasions including my rant about getting off the lawn...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Patriot Hackers: GET OFF MY LAWN!

April 18, 2012 Added by:Infosec Island Admin

Do something constructive instead of destructive and inhibiting. You never know what you are stumbling about in. You could be ruining operations that lead to arrests or actionable intelligence. Think about it before you go all Charles Bronson and then a Pastebin dump about it...

Comments  (3)

7fef78c47060974e0b8392e305f0daf0

Building a Better Anonymous: Separating the Philosophical from the Practical

April 18, 2012 Added by:Infosec Island Admin

Boiling it down to a simplistic statement, “Anonymous” - which means “unknown” - cannot at any time ever be considered a movement/group/collective that will never be used as a scapegoat for bad actors. Nor will it ever mean that bad actors will never get into the fold...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

A Detailed Analysis of the DDoS Phenomena

April 16, 2012 Added by:Pierluigi Paganini

The report showed 19.1TB of data and 14 billion packets of malicious traffic were aimed at financial services during Q4 2011, and that the traffic increased during Q1 2012, with 65TB of data and 1.1 trillion packets that were identified and mitigated. The figures are amazing...

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

Patriot Hackers: Stand YOUR Ground - Not Mine

April 16, 2012 Added by:Ali-Reza Anghaie

Let’s not replicate the sins of our Governments. Let’s not aggravate the problems Governments face. I don't disregard the threats radicalization online brings. I'm suggesting Cyber Vigilantism is not a movement we want to support by throwing our Western weight behind it...

Comments  (21)

9f19bdb2d175ba86949c352b0cb85572

Verizon DBIR 2012: Some Context...

April 12, 2012 Added by:Neira Jones

The Verizon DBIR 2012 was released last month and I am sure you have seen a lot on the subject. With every report, statistics and opinions have to be put in the right context. The conclusions are not surprising, but there are a few nuggets in the report worth examining...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

TeaMp0isoN Claims U.K. Anti-Terrorism Hotline Hack

April 12, 2012 Added by:Headlines

"We did it with ease. Their security is bizarre, it's as if they have no security whatsoever. The security they lack, it's incredible. They use an old phone system. It's pretty much the art of phreaking," a TeaMp0isoN member called 'Detonate' said in an interview...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Transcript: Patriot Hacker th3j35t3r Addresses USM Students

April 10, 2012 Added by:Anthony M. Freed

The hacktivist opened himself up to questions regarding his operations, methodologies and motivations - including his campaigns against radical militant websites, his take down of WikiLeaks, his tussles with Anonymous, his military service, and a variety of security issues...

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

China, Cyber Warfare and Challenges for the Future

April 09, 2012 Added by:Pierluigi Paganini

China's growing presence in cyber space will result in an increase in cyber operations against the nation. Due to the imbalance between an aggressive cyber offense its weak cyber defense capabilities, it could be the origin of significant technological problems for China...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec: The Eternal Struggle

April 06, 2012 Added by:Infosec Island Admin

The military and the government movers and shakers are all moving with fear tinged with desire, for more control over the internet as a whole while the beltway bandits are all in the wings, like a murder of crows watching dark eyed, waiting for their moment to strike...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

EU: Possession of Hacking Tools to Become a Criminal Offense

April 04, 2012 Added by:Headlines

Cyber attacks on IT systems would become a criminal offense punishable by at least two years in prison throughout the EU under a draft law backed by the Civil Liberties Committee. Possessing or distributing hacking software and tools would also be an offense...

Comments  (5)

94ae16c30d35ee7345f3235dfb11113c

The First Cyber Shot in a Chinese Jasmine Spring

April 01, 2012 Added by:Joel Harding

This does not look like a US military action against China, that is certain. Whoever put the message together seems to be dumbing it down to aid in translation. It’s as if it’s intended for an American audience, but nobody in their right mind would or should do that...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Authorities Apprehend the Hacktivist Known as th3j35t3r

March 31, 2012 Added by:Infosec Island Admin

In a shocking turn of events, the hacktivist known as th3j35t3r has been identified as Robert "Lance" Miller from Pittsboro, North Carolina. Mr Miller is now in police custody after the multi-agency operation took place in the early hours of the morning on April 1st, 2012...

Comments  (8)

09dae715e355968a0e90ebddf038ad56

Just One of the Reasons Why I Love Anonymous

March 28, 2012 Added by:Quintius Walker

In the world of cyber-security things transform at the speed of light. From exploits to methods, what worked yesterday is not the solution tomorrow. Ethical problem solving students should do themselves a favor and study the ways of the infamous idea known to us as Anonymous...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Cyber Attacks are Fastest Growing National Security Threat

March 22, 2012 Added by:Bill Gerneglia

Cybercrime is a relatively new phenomenon but because of its recent scale and game-changing implications for both government and industry it is rapidly becoming the dominant risk theme of the 21st century. The opportunity for cyber attacks grows daily...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Verizon 2011 Data Breach Investigation Report Summary

March 22, 2012 Added by:Headlines

"Mainline cybercriminals continued to automate and streamline their method du jour of high-volume, low-risk attacks against weaker targets. Much less frequent, but arguably more damaging, were continued attacks targeting trade secrets, classified information, and intellectual property..."

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »