Items Tagged with "Hacktivist"


68b48711426f3b082ab24e5746a66b36

A Conversation with Richard Clarke – Part I

January 31, 2012 Added by:Fergal Glynn

Chris Wysopal and internationally-renowned cyber security expert Richard Clarke discuss the changing cyber threat environment, the evolving cyber legislation landscape, and steps you can take to strengthen your organization’s resilience...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Hacking, Children, and Ethics

January 31, 2012 Added by:Infosec Island Admin

Anarchists who want nothing more than to just sow chaos for their own nihilistic animus produced what I call the “Monkeys with guns effect”: Scattershot and useless hacks and pranks that further no other agenda than the Lulz or to sow chaos anywhere they strike...

Comments  (19)

0ff0a77035f9569943049ed3e980bb0d

Cyber Shafarat 2012: Cyber Warfare, OpSec and Intelligence

January 30, 2012 Added by:

Cyber criminals, nation-states, hacktivists and other adversaries have different approaches to circumventing cyber defenses. They execute sometimes sophisticated, sometimes simple-minded attacks designed to use and exploit threat vectors as required to accomplish the task...

Comments  (0)

37d5f81e2277051bc17116221040d51c

2012 Threats: Are You Ready?

January 30, 2012 Added by:Robert Siciliano

Attackers from all over the world have set their focus on critical life supporting utilities such as water and power to hold those utilities hostage for payment or to disable them to cause terror. Unfortunately, many industrial and national infrastructure networks are vulnerable...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Five Tips on How to Prevent the Next Data Breach

January 28, 2012 Added by:Robert Siciliano

You may be aware of the uber techie bad boy hackers of Anonymous/LulzSec/AntiSec/WikiLeaks/ScriptKiddies and the organized web mobs of the world. Did you know they have wreaked havoc to the degree that almost a billion records have been compromised?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US-CERT Warns of Denial-of-Service Malware Campaign

January 26, 2012 Added by:Headlines

US-CERT has received reports of attacks using malware-laden email attachments. The advisory comes one week after multiple DDoS attacks were launched against entertainment industry and US government websites by Anonymous supporters in an operation dubbed OpMegaupload...

Comments  (0)

B09c361cbdc6cf629affdc7db30a186d

Social Business Trends for 2012

January 26, 2012 Added by:Steven Fox, CISSP, QSA

The use of social media by merchants could be targeted by hacktivists with a social agenda or by hackers with financial goals. If hackers aligned themselves with protesters, they could launch social media campaigns designed to influence the perception of a business...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Sophos Releases Security Threat Report 2012

January 26, 2012 Added by:Infosec Island Admin

Sophos unveiled its latest Security Threat Report 2012, a detailed assessment of the threat landscape—from hacktivism and online threats to mobile malware, cloud computing and social network security, as well as IT security trends for this coming year...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Cyberwar Comes to a Mall in Fresno? Not so Much...

January 24, 2012 Added by:Infosec Island Admin

A Pastebin dump alleged to be from Anonymous has forty-nine IP addresses with SCADA systems on them. Furthermore, those systems were claimed to not have any authentication on them whatsoever. I checked the IP’s and I have to say “meh” on this little dump by the skiddies...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Aaron Barr Terminated for Obsession with Anonymous

January 23, 2012 Added by:Headlines

"When I hired Aaron about eight months ago, it was under the perception that we were going to be able to help the NSA with some things relating to national security, not with Anonymous and social groups," John Sayres, the company's founder said...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

The Shifting Digital Sands of Online Jihad

January 21, 2012 Added by:Infosec Island Admin

It seems that Anonymous has potentially sparked these guys to think like them and perhaps even use their tactics instead of continuing just to shake their fingers at us as they yell. This would be an interesting paradigm change in the global Salafi movement as well as the tactics of AQ...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

How to Avoid Being Miscast in a SOPA Opera

January 20, 2012 Added by:Kevin McAleavey

LOIC was originally written in C#, but a later variant was created in Javascript which permits it to be deployed from any internet connected device. LOIC and its JS variant are simple toys, but in the hands of enough people they can create a formidable DDOS attack on a site...

Comments  (2)

F29746c6cb299c1755e4087e6126a816

A Hacker Handbook: Who Are the Bad Guys?

January 19, 2012 Added by:Kelly Colgan

When the Internet was a baby, hackers were fairly homogeneous. Some were scamming businesses for personal gain, but most were simple graffiti artists – breaking into websites to splash some MS Paint. It was a way to rebel and earn credibility within the computer community...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

DDoS Attacks Against Government and Entertainment Websites Escalate

January 19, 2012 Added by:Headlines

Multiple websites appear to be under DDoS attack, including the DoJ's http://justice.gov, the Recording Industry Association of America's http://riaa.com, and music publisher Universal Music's http://universalmusic.com...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Real Cyberwar: A Taxonomy

January 18, 2012 Added by:Infosec Island Admin

Cyberwar should only be leveled as a term when the actual use of warfare if involved. Cyberwar, as yet, has NOT happened. There have been Cyber Operations if you want to use the term but most of what we have been seeing in the news cycle is once again, NOT cyberwar...

Comments  (2)

D551093f5d8af724e17929c91eb90d63

Social Business Security and Risk Management Strategies

January 18, 2012 Added by:Andrea Zapparoli Manzoni

This is not something that the Marketing Department can handle alone, nor IT, not even the Security Team the Legal Department: all will fail if given the task of managing an organization's Social Business Strategy outside a multidisciplinary and truly integrated approach...

Comments  (0)

Page « < 5 - 6 - 7 - 8 - 9 > »