Blog Posts Tagged with "Black Hat"
September 19, 2012 Added by:Tripwire Inc
The grey hat is more interested in the “how” than the “why”. There is a respect for the black hat's technical abilities, while keeping a wary eye on them. Some grey hats have had run ins with the law, not due to being malicious, but because curiosity got the best of them...
September 11, 2012 Added by:Jim Palazzolo
If you give public attention to your adversary, the stronger they get. We keep using terms like “Hacker” and “Black Hat”. I understand the need to classify the behavior. However, are we inadvertently giving individuals too much inherited power by recognizing them in context and connotation?
July 31, 2012 Added by:Dan Klinedinst
I just got home from the "Vegas week" of Black Hat, BSidesLV, and DefCon. I love many things about each, and each has things I wish they'd do better. This is true of all the conferences I've attended. However, a few questions are lingering in my mind after Vegas, possibly due to the effects of sleep deprivation...
July 30, 2012 Added by:alan shimel
There was a time that Black Hat was where the edge met the establishment, but Black Hat has gone totally corporate and seems to have lost the edge. All of the edge seems to have gone to BSides. I love both Black Hat and BSides and think each needs a little bit of what the other has to be whole, viable and successful...
May 17, 2012 Added by:Jayson Wylie
If I said "hacker", everyone knows what goes along with that, and the audience may be impressed or annoyed depending on their fanfare or if they have been victimized. People still think hacker when they hear "pentester" and do not believe the in the existence of pure "white hats"...
May 08, 2012 Added by:Lee Munson
One of the most used tricks that black hat hackers use during this time of year is to piggyback off of the advertising of big budget movies. There are a lot of ways that you can leverage attacks with this type of advertising and believe me they use all of them...
May 01, 2012 Added by:Marc Quibell
Right there as top IT News was an article on how to pwn a Hotmail account. It was a 0-day exploit, which meant no one at Microsoft was notified. It was written by a self-described ethical hacker. Naturally my first reaction was, "Ya right"...
March 06, 2012 Added by:Rafal Los
The significance of quality talent can't be overlooked - having a second-rate individual watching your virtual piggy-bank is as good as having none. It's not like there are thousands of ex-con hackers out there looking for work - but I suspect there are more than you think...
January 19, 2012 Added by:Kelly Colgan
When the Internet was a baby, hackers were fairly homogeneous. Some were scamming businesses for personal gain, but most were simple graffiti artists – breaking into websites to splash some MS Paint. It was a way to rebel and earn credibility within the computer community...
November 07, 2011 Added by:Emmett Jorgensen
Hackers are often portrayed as social outcasts or criminals looking to defraud the unsuspecting public. The media frequently makes little or no distinction between hacker types, simply lumping them all together into a malevolent group. The truth is hackers come in all shapes and sizes...
September 14, 2011 Added by:Headlines
The ensemble is somewhat surprising - a collection of both white and black hat innovators who's activities often landed them on either side of the law, but who nonetheless had a tremendous impact on information technology as we know it today...
June 26, 2011 Added by:Lee Munson
You are not going to find much sympathy by most people since you are out there doing something illegal. So you must be just like the rest of the criminal world and prepare to live your life by trusting very few people and always be aware that anyone can turn on you...
March 25, 2011 Added by:Robert Siciliano
Governments around the globe realize that it serves their military objectives to be well positioned online. The saying used to be, “He who controls the seas controls the world,” and then it was, “He who controls the air controls the world.” Now it’s all about controlling cyberspace...
February 14, 2011 Added by:Alexander Polyakov
During the BlackHat DC conference, DSecRG experts talked about attacks on corporate business-applications which can be used by cybercriminals for espionage, sabotage and fraudulent actions. Despite the fact, companies like SAP and Oracle regularly release security updates that are subject to attacks...
February 07, 2011 Added by:Sam Bowne
I remain convinced that the world of infosec is really polarized. The "white hats" help protect society, obey the law, and can be trusted; while the "black hats" lie, steal, extort, hurt people, and cannot be trusted. There are exceptions, but that model describes the most common situations...
January 25, 2011 Added by:Headlines
Michael Gregg has assembled his picks for the top six hacks revealed at the Black Hat DC 2011 conference. Dozens of innovative threats were revealed at the conference last week, but Gregg describes these particular exploits as being the "six new hacks that will make your CSO cringe"...
Wanna Buy Some Dumps?... Biniohs Chekcer on 06-19-2013
Student Pleads Guilty to Counterfeiting Coup... on 06-18-2013