Blog Posts Tagged with "al-Qaeda"

7fef78c47060974e0b8392e305f0daf0

Shamikh1.info: The New Den of Scum and Villainy

July 02, 2011 Added by:Infosec Island Admin

It's anyone’s guess as to the attack's perpetrators, methods, and final outcome until someone from the Al-Qaeda camp speaks up. Meanwhile, the media will continue to spin on MI6 hacking them or those mysterious British hackers that many articles mentioned. “Bollocks” As they say in England...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Game of Whack-A-Mole: Was Al-Shamukh Hacked?

June 30, 2011 Added by:Infosec Island Admin

Who attacked Shamikh and why? There no evidence cited or even hinted at in the real world that MI6 or MI5 for that matter had anything to do with this. For all they know, it could have been The Jester or someone with like technology that DoS’d them and got them yanked offline by their host...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacker Attack Disrupts Al-Qaeda Communications

June 30, 2011 Added by:Headlines

“Al-Qaeda's online communications have been temporarily crippled... Hacking attacks by amateur cybervigilantes typically involve one technique, be it DDOS or SQLI. This particular event began as a basic domain hijacking, which does tend to happen every so often..."

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Important Security Tips for Jihobbyists At Majahden

June 29, 2011 Added by:Infosec Island Admin

Majahden have been learning about how psyops, hacking, disinformation, and being pwn3d works. With the new invigoration in the cyber-jihadi community since Osama Bin Laden's demise, they have taken up the gauntlet not only to hack, but to wage a cyber-propaganda campaign like never before...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Terrorism and New Media: The Post Al Qaeda Generation

May 06, 2011 Added by:Ben Rothke

The Internet has revolutionized how we socialize and do business, speeding commerce, facilitating knowledge sharing, and creating networks that could not have existed a decade ago. Unfortunately, terrorists reap the same benefits...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Osama Bin Laden's Computer Files and Data Encryption

May 06, 2011 Added by:Headlines

"Correctly implemented encryption is very difficult to break. If data is encrypted correctly using good, best practices, I'm not aware of the ability to break that encryption. If correctly implemented and done by someone who understands how to do it, it's a huge, huge challenge..."

Comments  (0)

959779642e6e758563e80b5d83150a9f

What if al-Qaeda Got Stuxnet?

March 02, 2011 Added by:Danny Lieberman

Given these circumstances, deterrence will necessarily be based more on denying any benefit to attackers than on imposing costs through retaliation. To stay ahead of its pursuers, the United States must constantly adjust and improve its defenses...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Cyberterrorism - As Seen On TV

March 01, 2011 Added by:J. Oquendo

The fact is, cyberterrorism is such an overrated term with no definitive rhyme or reason and it seems that anyone who uses antivirus software nowadays can call themselves a security expert, spread a rumor, embed the term terrorism and cause more damage than some lowly terrorists...

Comments  (1)

Page « < 1 - 2 > »