Items Tagged with "Hacktivist"


69dafe8b58066478aea48f3d0f384820

Top Five Security Threats to Monitor

February 25, 2011 Added by:Headlines

One of the biggest problems Khan notes is the inability of targeted entities to produce accurate information pertaining to attack attribution, citing a report by the ITRC which stated that out of the 662 registered breaches, forty percent of targets could not identify the origin of the attacks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacktivists Deface Westboro Baptist Church Website

February 25, 2011 Added by:Headlines

That both The Jester and Anonymous attacked Westboro Baptist Church websites this week represents a very strange convergence, and the prospect that two highly active hacktivist camps might find more common ground is tantalizing to say the least...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacktivism Makes for Strange Bedfellows

February 24, 2011 Added by:Headlines

Anonymous members and The Jester have publicly traded jabs for several months, each threatening to undermine and expose the other's operations. Strangely enough, they may have had a meeting of the minds when it comes to their mutual disdain for the Westboro Baptist Church...

Comments  (3)

6d117b57d55f63febe392e40a478011f

B of A Enlists Security Firms to Undermine WikiLeaks

February 10, 2011 Added by:Anthony M. Freed

The fallout from the HBGary Federal breach continues to spread as leaked documents reveal that BofA was soliciting proposals for strategies to undermine WikiLeaks. The proposed strategies suggested a variety of tactics which ranged from a disinformation campaign to outright cyber attacks...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Anonymous DDoS Participants Arrested in UK

January 27, 2011 Added by:Headlines

Anonymous DDoS attackers are typically teenagers and young adults who have little or no understanding of the risks and legal repercussions that can stem from participating in the attacks, and most operate under the misconception that they can not be identified by authorities...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Researcher Links anonops.ru IRC with Cyber Criminals

January 14, 2011 Added by:Headlines

"Whenever a big event occurs around the world cybercrime jumps at the chance to exploit it. And this appears to be the case with WikiLeaks and Anonymous. What an opportunity for criminals to take advantage of a volunteer army eager to take part in a struggle"...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Top Eight Security Threats for 2011

December 28, 2010 Added by:Headlines

McAfee Labs threat research Vice President Dmitri Alperovitch has outlined his top eight picks for the security threats to be aware of over the next year. "We are seeing an escalating threat landscape in 2011," said Alperovitch...

Comments  (0)

B426b30042abbc15e363cb679bbc937d

Anonymous Turns Payback Towards The Jester

December 11, 2010 Added by:Daniel Kennedy

The first reason is obviously the Jester’s attacks on WikiLeaks, the second more direct reason may be attacks on the Internet Relay Chat servers that Anonymous is using to coordinate attacks. They believe the Twitter account “AnonymousDown” is the same person who is behind th3j35t3r...

Comments  (6)

6d117b57d55f63febe392e40a478011f

Hacker Releases Second Video of Enhanced XerXeS DoS Attack on Apache Vulnerability

March 11, 2010 Added by:Anthony M. Freed

Infosec Island has once again gained exclusive access to a video demonstration of the XerXeS DoS. This new video shows a little more of the XerXeS dashboard, and reveals even more about the attack technique – watch the text box on the left as Jester mentions “Apache” for the first time outside of our private conversations.

Comments  (15)

6d117b57d55f63febe392e40a478011f

Exclusive Video of XerXeS DoS Attack

February 22, 2010 Added by:Anthony M. Freed

Infosec Island has gained exclusive access to a video demonstration of the XerXeS DoS attack as it is unleashed on the Taliban website www.alemarah.info, and carried out by infamous patriot hacker The Jester (th3j35t3r).

Comments  (10)

6d117b57d55f63febe392e40a478011f

Jester Unveils XerXeS Automated DoS Attack

February 10, 2010 Added by:Anthony M. Freed

Anti-jihadi hacker The Jester (th3j35t3r), continues his campaign against militant Islamic websites, and now reveals the development of an automated version of his DoS attack, which he calls the XerXeS project.

Comments  (4)

6d117b57d55f63febe392e40a478011f

More Talks with Anti-Jihadi Hacker The Jester

February 04, 2010 Added by:Anthony M. Freed

Anti-jihadi hactivist The Jester (th3j35t3r), the self-proclaimed Nicest Hacker in the World, has returned for part two of our conversation concerning his campaign of intermittent disruption of militant pro-jihad websites.

Comments  (1)

6d117b57d55f63febe392e40a478011f

Hacktivist Tactics Raise Ethical Questions

January 27, 2010 Added by:Anthony M. Freed

Recently we have witnessed the emergence of international hactivist and vigilante “the Jester” through his crusade against jihadi and militant Islamic networks...Jester’s activities raise an important question:  Where do cyber vigilantes fall on the infosec ethics spectrum?

Comments  (19)

Page « < 12 - 13 - 14 - 15 - 16 > »