Blog Posts Tagged with "Anonymous"
March 28, 2011 Added by:Headlines
The rogue hacktivist movement Anonymous is apparently breaking out the Low Orbit Ion Cannon again for a reprise of the Operation Payback campaign, this time setting their distributed denial of service (DDoS) attack sites on the Recording Industry Association of America (RIAA)...
March 24, 2011 Added by:Headlines
The DoS attacks against WBC sites have now exceeded one month in duration. The Jester uses a DoS tool called XerXeS to perform an application level attack which can be performed by a single low-spec machine with relatively few packets, whereas traditional TCP-based attacks require multiple machines...
March 24, 2011 Added by:Pascal Longpre
Documents leaked in the attack on HBGary shed light on numerous rootkit technologies designed to evade or bypass mainstream detection software and circumvent protections thought to be unbreakable by design. Malware like this also renders disk encryption, DLP and SIEM solutions mostly irrelevant...
March 22, 2011 Added by:Headlines
"They are going after people's family and children. They actually have all the family members listed. And they call them up on the phone. They harass them. There have been cases where death threats have been left. It's just ridiculous, and it's completely unacceptable," Hoglund said...
March 21, 2011 Added by:Infosec Island Admin
Hubris/A5h3r4/Metric have broken into the inner circle of one cell of Anonymous. I say "cell" because I do not think that these users are the actual full scale leaders. These folks, if the chat transcripts are true, are the ones behind the HBGary hack and at least one of them the Gawker hack...
March 19, 2011 Added by:Infosec Island Admin
"A hacker startup calling itself Backtrace Security–made up of individuals who formerly counted themselves as part of Anonymous’ loose digital collective–announced plans Friday to publish identifying information on a handful of active members of Anonymous..."
March 16, 2011 Added by:Headlines
"Kayla played a crucial role, posing as Barr to an IT administrator... to gain access to the company’s servers... [Kayla] and four other hackers broke into his company’s servers... defacing his Web site, purging data and posting more than 50,000 of his emails online for the world to see..."
March 14, 2011 Added by:Headlines
In this case it looks as if select emails were leaked without the necessary context to understand their significance in an effort to generate some heat but provide little light, which really only works to satisfy the disgruntled former employee's desire to make trouble...
March 10, 2011 Added by:Infosec Island Admin
As I have been trying to point out, that any time you have a group of entities together, there will be de-facto leaders, there will be troops, and there will always be the possibility of making mistakes that will lead to capture. It’s just the nature of the beast...
March 09, 2011 Added by:Headlines
Emails leaked in the HBGary Federal network breach reveal a spate of high level attacks targeting leading companies across multiple industries. The foreign-based attacks appear to be industrial espionage efforts intended to harvest sensitive trade secrets and intellectual property...
March 07, 2011 Added by:Headlines
"The Internet is a weapon. It’s already weaponized, and those of us who know how to use this weapon have the advantage. I know who else was involved in turning [Manning] in. I'm not sure what to do on that yet, but we're speaking among ourselves about that..."
March 02, 2011 Added by:Headlines
"A group of House Democrats is calling on Republican leaders to investigate a prominent Washington law firm and three federal technology contractors, who have been shown in hacked e-mails discussing a 'disinformation campaign' against foes of the U.S. Chamber of Commerce"...
March 01, 2011 Added by:Headlines
Debate has ensued about whether private security companies should be actively developing strategies that include potentially illegal acts, engaging in disinformation and propaganda campaigns on behalf of the government, and developing powerful cyber offensive weapons...
February 28, 2011 Added by:Robb Reck
Defending our finances and data are no longer enough to keep our organization safe on the internet. We need to keep our company off of the front page. This new breed of hackers is not going away anytime soon. We need to adapt to them, as they certainly are adapting to circumvent us...
February 25, 2011 Added by:Headlines
Revelations about the proposed tactics and operations set forth by HBGary Federal and the other security companies involved should be cause for concern amongst the information security community, as they largely portray security professionals as being techno mercenaries and hired guns...
February 25, 2011 Added by:Headlines
That both The Jester and Anonymous attacked Westboro Baptist Church websites this week represents a very strange convergence, and the prospect that two highly active hacktivist camps might find more common ground is tantalizing to say the least...
Today's Mobile Device Data Protection Must G... Mic Micac on 09-02-2014
Join the Security Intelligence Network on Li... Mic Micac on 09-02-2014
What PCI Requirements Apply to Us: Tacking a... Mic Micac on 09-02-2014