Items Tagged with "Hacking"


37d5f81e2277051bc17116221040d51c

Adobe a Target for Criminal Hackers

July 16, 2010 Added by:Robert Siciliano

Every browser requires a program to open PDFs. According to an estimate from McAfee, in the first quarter of this year, 28% of all exploit-carrying malware leveraged a Reader vulnerability...

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

Al-Qa'eda on the Arabian Peninsula - A Brief Overview of 'Inspire'

July 14, 2010 Added by:

It is important to understand that the EIs continue to use our infrastructure against as they have over the years during physical attacks and currently using social network software and sites to drive awareness and training while building recruitment through online communities and various forms of propaganda...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Hackers Play Social Engineering Capture the Flag At Defcon

July 13, 2010 Added by:Robert Siciliano

Defcon is known for its antics but it’s also an event where hackers of all flavors improve their skills. The game they are playing this year is a social engineering fun-o-rama called Social Engineering CTF, referencing the game Capture the Flag...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Top 10 Jobs For Criminal Hackers

May 12, 2010 Added by:Robert Siciliano

So you wanna go to the dark side? You’ve been hearing all about this hacking thing and you’d like to impress your girlfriend and show her how you can hack into corporate databases eh? Well, first if you are nodding your head, you’re an idiot. Second, chances are better than ever that you’ll get caught.

Comments  (2)

E66d48d7b227e7845b73d43eb1a06fcb

Should we be afraid of Chinese hackers? ...Or lost cyber war

April 27, 2010 Added by:Roman Zeltser

The terms "cyber terrorism" or "information warfare" are derived from political agendas of those who rule the countries or from global conglomerates and large corporations that don't hesitate to use any possible measures to achieve their goal. The information age gave us not only sophisticated computer equipment, software, and gadgets but also something that many of u...

Comments  (4)


From the Web

China Shut Down Biggest Hacker Training Site

February 09, 2010 from: Saumil's Infosec Blog

What is believed to be the country's biggest hacker training site has been shut down by police in Central China's Hubei province. Three people were also arrested, local media reported yesterday. The three, who ran Black Hawk Safety Net, are suspected of offering others online attacking programs and software, a crime recently added to the Criminal Law. A total of 1.7 million yuan ($249,000) in asse...

Comments  (2)


From the Web

Hacking Takes Lead as Top Cause of Data Breaches

January 09, 2010 from: Office of Inadequate Security

Hacking has topped human error as the top cause of reported data breaches for the first time since such tracking began in 2007, according to the Identity Theft Resource Center’s 2009 Breach Report.In its report, titled “Data Breaches: The Insanity Continues,” the non-profit ITRC found that 19.5 percent of reported breaches were due to hacking, with insider theft as th...

Comments  (0)


From the Web

Shodan scares me

December 04, 2009 from: hackyourself.net

One of the problems of being white-hat hacker is that we scare ourselves. Such is the case of the "Shodan" engine that was released last month. It's a simple idea, one that has been discussed before. It simply scans the Internet for likely web server ports and indexes the HTTP headers that come back. Now that somebody has actually done it, and we can play wi...

Comments  (2)

Page « < 10 - 11 - 12 - 13 - 14 > »