Items Tagged with "Hacktivist"


03b2ceb73723f8b53cd533e4fba898ee

China vs. Philippines: Cyberwar or Hacktivism?

May 03, 2012 Added by:Pierluigi Paganini

While attention is focused on Iran and its quarrel with the West, other silent battles are being fought. In the last month, there has been a surprising level of activity between China and the Philippines, with reciprocal attacks via bits and bytes. Are we witnessing a cyber conflict?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacktivists Claim Government and Military Systems Breach

May 03, 2012 Added by:Headlines

A new hacktivist group claims to have breached the systems of multiple government, military and private organizations. The hackers posted screenshots of their intrusions to support their claims, as well as posting what is characterized as military files for access on MediaFire...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Why Taunting Computer Hackers Isn’t a Good Idea

April 25, 2012 Added by:Robert Siciliano

UFC President issued the challenge to hackers because he supports SOPA and PIPA, and UFC.com was hacked. Kicking a hornets’ nest isn’t advisable, and neither is taunting criminal hacktivists who have lots of time and resources to make your business network a target...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Krypt3ia's Rebuttal to th3j35t3r: Oh Jokey…

April 24, 2012 Added by:Infosec Island Admin

I fundamentally disagree with Jester’s method and his goals, as much as they have been explained of breaking their communications. I pretty much explained myself in rather clear, albeit terse, language on several occasions including my rant about getting off the lawn...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Patriot Hackers: GET OFF MY LAWN!

April 18, 2012 Added by:Infosec Island Admin

Do something constructive instead of destructive and inhibiting. You never know what you are stumbling about in. You could be ruining operations that lead to arrests or actionable intelligence. Think about it before you go all Charles Bronson and then a Pastebin dump about it...

Comments  (3)

7fef78c47060974e0b8392e305f0daf0

Building a Better Anonymous: Separating the Philosophical from the Practical

April 18, 2012 Added by:Infosec Island Admin

Boiling it down to a simplistic statement, “Anonymous” - which means “unknown” - cannot at any time ever be considered a movement/group/collective that will never be used as a scapegoat for bad actors. Nor will it ever mean that bad actors will never get into the fold...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

A Detailed Analysis of the DDoS Phenomena

April 16, 2012 Added by:Pierluigi Paganini

The report showed 19.1TB of data and 14 billion packets of malicious traffic were aimed at financial services during Q4 2011, and that the traffic increased during Q1 2012, with 65TB of data and 1.1 trillion packets that were identified and mitigated. The figures are amazing...

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

Patriot Hackers: Stand YOUR Ground - Not Mine

April 16, 2012 Added by:Ali-Reza Anghaie

Let’s not replicate the sins of our Governments. Let’s not aggravate the problems Governments face. I don't disregard the threats radicalization online brings. I'm suggesting Cyber Vigilantism is not a movement we want to support by throwing our Western weight behind it...

Comments  (21)

9f19bdb2d175ba86949c352b0cb85572

Verizon DBIR 2012: Some Context...

April 12, 2012 Added by:Neira Jones

The Verizon DBIR 2012 was released last month and I am sure you have seen a lot on the subject. With every report, statistics and opinions have to be put in the right context. The conclusions are not surprising, but there are a few nuggets in the report worth examining...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

TeaMp0isoN Claims U.K. Anti-Terrorism Hotline Hack

April 12, 2012 Added by:Headlines

"We did it with ease. Their security is bizarre, it's as if they have no security whatsoever. The security they lack, it's incredible. They use an old phone system. It's pretty much the art of phreaking," a TeaMp0isoN member called 'Detonate' said in an interview...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Transcript: Patriot Hacker th3j35t3r Addresses USM Students

April 10, 2012 Added by:Anthony M. Freed

The hacktivist opened himself up to questions regarding his operations, methodologies and motivations - including his campaigns against radical militant websites, his take down of WikiLeaks, his tussles with Anonymous, his military service, and a variety of security issues...

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

China, Cyber Warfare and Challenges for the Future

April 09, 2012 Added by:Pierluigi Paganini

China's growing presence in cyber space will result in an increase in cyber operations against the nation. Due to the imbalance between an aggressive cyber offense its weak cyber defense capabilities, it could be the origin of significant technological problems for China...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec: The Eternal Struggle

April 06, 2012 Added by:Infosec Island Admin

The military and the government movers and shakers are all moving with fear tinged with desire, for more control over the internet as a whole while the beltway bandits are all in the wings, like a murder of crows watching dark eyed, waiting for their moment to strike...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

EU: Possession of Hacking Tools to Become a Criminal Offense

April 04, 2012 Added by:Headlines

Cyber attacks on IT systems would become a criminal offense punishable by at least two years in prison throughout the EU under a draft law backed by the Civil Liberties Committee. Possessing or distributing hacking software and tools would also be an offense...

Comments  (5)

94ae16c30d35ee7345f3235dfb11113c

The First Cyber Shot in a Chinese Jasmine Spring

April 01, 2012 Added by:Joel Harding

This does not look like a US military action against China, that is certain. Whoever put the message together seems to be dumbing it down to aid in translation. It’s as if it’s intended for an American audience, but nobody in their right mind would or should do that...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Authorities Apprehend the Hacktivist Known as th3j35t3r

March 31, 2012 Added by:Infosec Island Admin

In a shocking turn of events, the hacktivist known as th3j35t3r has been identified as Robert "Lance" Miller from Pittsboro, North Carolina. Mr Miller is now in police custody after the multi-agency operation took place in the early hours of the morning on April 1st, 2012...

Comments  (8)

Page « < 1 - 2 - 3 - 4 - 5 > »