Items Tagged with "hackers"


0a8cae998f9c51e3b3c0ccbaddf521aa

Are Enterprises Really Hacking the Hackers?

June 27, 2012 Added by:Rafal Los

Active defense is using technology which can confuse an attacker, mislead them into spending time on worthless parts of an application, or slowing the response rate of the network or application down. That's active defense. Striking back involves actually going on the offensive, which is likely highly illegal...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Sabu: The Anonymous Zeitgeist?

June 27, 2012 Added by:Infosec Island Admin

If Sabu was so loved by anonymous and approved of, then they have completely abdicated their core beliefs in operations and set themselves up for the fall that came with Sabu’s arrest and subsequent rolling over on everyone in the “movement” that have spawned all of the arrests we are now seeing come to trial...

Comments  (2)

94ae16c30d35ee7345f3235dfb11113c

Striking Back in Cyberspace: Sanctioned or Vigilantism?

June 26, 2012 Added by:Joel Harding

You can strike back. Hiring your own security team you can discover who broke into your system. Establishing a honeypot, replicating your system and putting in ghost files will this tie up your infiltrators and significantly waste their time, and you can find out more about their techniques and track where they are...

Comments  (1)

6648b1abd4a9b964566c3690613f20a6

Companies Go on the Offensive

June 26, 2012 Added by:Mark Baldwin

Being the victim of an attack is not fun and it is easy to understand why businesses would like to take a more active stance against the attackers. Unfortunately, businesses that go down this path are likely to run into technical and legal problems. Let’s examine some of the possible outcomes...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Russian Authorities Take Out World’s Largest Banking Botnet

June 26, 2012 Added by:Headlines

"The criminal activities were committed by a 22-year-old young man who is widely known in the hacker community under the nicknames of 'Germes' and 'Arashi'. The young man was not only developing bot-networks and massively distributing malicious programs but also personally took part in stealing funds"...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Hacking Strikes Fear in the Heart of Texas Bureau of Prisons

June 24, 2012 Added by:Electronic Frontier Foundation

Whether you call them hackers, makers, tinkerers, or information security researchers, people on the hacking spectrum have been a boon to society for decades. They power innovation in all sectors and operate as a valuable check on the security and stability of the technology that forms the basis for our society...

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Medical Device Security: This Time It’s Personal

June 22, 2012 Added by:shawn merdinger

The work done by security researchers on their own devices is only the beginning of what we can expect will be a deluge of medical device related vulnerabilities, and it’s worthwhile to explore some of the reasons as to why the current situation is the way it is now...

Comments  (0)

Ebe141392ea3ebf96ba918c780ea1ebe

Infosec: Too Many Questions

June 20, 2012 Added by:Wendy Nather

Does having one machine on a botnet at some point automatically mean that more nefarious things are going on besides just selling V1agr4 or perhaps DDoSing the Anonymous target of the week? This is the risk calculation that we need more data to perform, and it's one that the C-suite would really appreciate...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Active Defense: The New Digital Wild West Justice

June 19, 2012 Added by:Infosec Island Admin

This will just get out of hand and incredibly stupid. Sure, you can say that you are just going to maybe tarpit those attackers to prevent them from getting in quickly, but, you have to know that there will be (already are) services where blackhat types will hack back against those who “dun you wrong”...

Comments  (0)

11146d62a6c31fb9fac8ac8ac991e08d

We Don’t Need Cyber-Vigilante Justice

June 15, 2012 Added by:Andy Willingham

You see what made me so mad? It wasn’t the release of the PII of all those innocent people, it was their reason for doing it. They reported a web site vulnerability and it wasn’t fixed, so they decided to post PII of thousands of people on the internet. Who put them in the role of deciding who wins and who loses?

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Panetta: Urgency Needed to Defend Against Cyber Attacks

June 15, 2012 Added by:Headlines

“I'm very concerned at the potential in cyber to be able to cripple our power grid, to be able to cripple our government systems, to be able to cripple our financial systems. It would virtually paralyze this country. And as far as I'm concerned, that represents the potential for another Pearl Harbor… using cyber"...

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

LulzSec Reborn vs Twitter and OAuth Security Issues

June 13, 2012 Added by:Pierluigi Paganini

The third-party authentication process implements the open standard for authorization, or OAuth, that allows users to share private resources stored on one site with another. The hack raises a serious question regarding the security level ensured by third-party authentication processes...

Comments  (0)

37d5f81e2277051bc17116221040d51c

POS Skimming: Bad News for Banks and Merchants

June 12, 2012 Added by:Robert Siciliano

EFTPOS skimming — which stands for “electronic funds transfers at the point of sale” — involves either replacing the self-swipe point of sale terminals at cash registers with devices that record credit and debit card data, or remotely hacking a retailer’s POS server...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iran Fingers US Hackers in Oil Ministry Attacks

June 12, 2012 Added by:Headlines

"Two American IPs were identified in the (cyber) attack against the oil ministry... The nature of the attack and the identity of the attackers have been discovered, but we cannot publicize it since we are still working on the case..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Analysis of Passwords Dumped from LinkedIn

June 11, 2012 Added by:Dan Dieterle

People put a lot of personal information on LinkedIn - their education and job experience, along with the groups that they belong to - treasure trove of information to Social Engineers. Of all the online social sites, LinkedIn users should really choose a long complex password to secure their account...

Comments  (0)

296634767383f056e82787fcb3b94864

LinkedIn Failed to Meet Standards or Better Standards are Needed

June 10, 2012 Added by:Jeffrey Carr

LinkedIn doesn't have a CSO or CISO, which for a publicly traded company communicates that security is not a priority. Considering they still don't know how this breach occurred and the minimal attention payed to password security, I can't help but wonder how secure the credit card information is...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »