Blog Posts Tagged with "WikiLeaks"
October 18, 2012 Added by:Pierluigi Paganini
Hacktivism is considered one of the main cyber threats and its operations have created serious problems to private businesses and governments, for this reason security expert all over the world are trying to deeply analyze the different movements of dissent and their mutual relationships...
September 19, 2012 Added by:Christopher Laing
For collective intelligence directed at security breaches, I would argue, that an effective means of transparently sharing details without fear of recrimination and embarrassment would greatly reduce the impact of such breaches. Fine idea, but how can this be achieved?
June 12, 2012 Added by:Headlines
Manning is accused of the largest intelligence leak in U.S. history while deployed to Iraq as a military intelligence analyst, including installing unauthorized software onto government computers to extract classified information and transmitting the data to the whistle-blowing group WikiLeaks...
June 05, 2012 Added by:Laura Walker
Although the Jester is often described as a cyber vigilante, his operations tend to steer shy of retributive justice and drive more toward disruption of enemy operations. His targets are researched, specific, and his mission is consistent. There is also the psychological component to PWNing the enemy...
May 16, 2012 Added by:ʞɔopuooq ʇuıɐs
As I watched, the conspiracies mounted – one of my favorites is that Smedley is in fact me and I am cashing out or something, so I decided to up the ante. I (probably stupidly in hindsight) unpublished my blog posts and deactivated my twitter to lend credibility to Smedley's claims...
April 10, 2012 Added by:Anthony M. Freed
The hacktivist opened himself up to questions regarding his operations, methodologies and motivations - including his campaigns against radical militant websites, his take down of WikiLeaks, his tussles with Anonymous, his military service, and a variety of security issues...
February 29, 2012 Added by:Scot Terban
Some of us out there know a little bit about how intelligence works. While the likes of WikiLeaks rail about how some are using money and perhaps even sex to sway their sources, the reality is that this game has always been played this way. Intelligence is a dirty business...
December 30, 2011 Added by:Scot Terban
If you really want to see why so much has happened with Anonymous, WikiLeaks, Manning, and OWS you need only look toward Capitol Hill and smell the rank problem that is our governing body. We have are at an apex that has reached the lows of the Roman empire in its decline...
October 11, 2011 Added by:Scot Terban
Anonymous’ use of technology comes naturally, as they formed online. It is with the growth of connectivity that the movement went viral. Some may say it was the targeting. I say the targeting was always there, but those who were feeling the miasma weren’t able to express it in normal ways...
September 08, 2011 Added by:John Linkous
Many asked why, given that Agencies had the latest incident and event management technologies, the breach had not at least been spotted sooner - even if they were unable to prevent it completely. What followed is a response unlike any I've seen to date in the commercial sector...
August 25, 2011 Added by:Headlines
Scotland Yard has announced the arrest of Peter David Gibson, 22, on charges that the student participated in distributed denial of service (DDoS) attacks organized by the rogue hacktivist group Anonymous, particularly an attack on the online payment processor Pay Pal late last year...
July 27, 2011 Added by:Headlines
Scotland Yard says officers from its specialist cybercrime unit have arrested the suspected spokesman of the LulzSec hacking group. In a statement Wednesday the police force says that the 19-year-old was arrested at an address in Scotland. They say he is the hacker known as 'Topiary'...
July 25, 2011 Added by:Headlines
“I look at it like the precursor to revolution. I really think this is throwing tea in the bay. I’m tired of seeing a financial industry suck at the trough of 401K’s, looting my nation and leaving us a third-world country..."
May 04, 2011 Added by:Headlines
"Facebook, Google, Yahoo – all these major US organizations have built-in interfaces for US intelligence. It’s not a matter of serving a subpoena. They have an interface that they have developed for US intelligence to use..."
April 25, 2011 Added by:Headlines
The revelations in those documents range from intelligence on the whereabouts of Al Qaeda leaders to the individual stories of often-innocent detainees to the ugly and ineffective improvisations on intelligence gathering within Guantanamo’s operations...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013