Blog Posts Tagged with "Hacktivist"
June 13, 2012 Added by:Pierluigi Paganini
The third-party authentication process implements the open standard for authorization, or OAuth, that allows users to share private resources stored on one site with another. The hack raises a serious question regarding the security level ensured by third-party authentication processes...
June 05, 2012 Added by:Pierluigi Paganini
It seems that the company was aware of the principal vulnerabilities in their systems, and lack of patching opened the way to the exploit. The hackers discovered in the Warner Bros network a presentation, prepared by the Technical Operations department, for a security audit...
June 03, 2012 Added by:Jay Turla
A few weeks ago, busabos from the Anonymous #OccupyPhilippines defaced two government websites from China and posted the pictures and details of Wang Lei a.k.a y0c0 smart, the leader of the Silic Group Hacker Army and the admin of blackbap.com which is the forum site of Silic Group Hacker Army...
May 29, 2012 Added by:Headlines
When asked about the threat of arrest, Balaneasa said: "Romanian authorities (most of them) are just too stupid. I wonder what else they are taking seriously, besides hacking... Afraid? NEVER. We will fight to the end. And to be honest, all they will 'catch' may be clips of themselves sucking their own finger..."
May 25, 2012 Added by:Headlines
The Cyber Division of the FBI warned several large corporations of the potential for DDoS and data exfiltration attacks scheduled for today, May 25. The attacks are being coordinated by the rogue movement Anonymous in an an exercise termed "Operation NewSon"...
May 25, 2012 Added by:Infosec Island Admin
Governments need to get a handle on this. If they want patriot hacker units, then they will have them and they will be controlled. As opposed to the Batman vigilante model that we now have here. If they did this, there would be plenty of volunteers and it might be a good thing...
May 22, 2012 Added by:Headlines
"The department is looking into the unauthorized access of a website server operated by the Bureau of Justice Statistics that contained data from their public website. The... website has remained operational throughout this time. The department’s main website... was not affected..."
May 16, 2012 Added by:ʞɔopuooq ʇuıɐs
As I watched, the conspiracies mounted – one of my favorites is that Smedley is in fact me and I am cashing out or something, so I decided to up the ante. I (probably stupidly in hindsight) unpublished my blog posts and deactivated my twitter to lend credibility to Smedley's claims...
May 16, 2012 Added by:Pierluigi Paganini
"Right now we have access to every classified database in the U.S. government. It’s a matter of when we leak the contents of those databases, not if. You know how we got access? We didn’t hack them. The access was given to us by the people who run the systems…"
May 14, 2012 Added by:Headlines
The content on a website maintained by anit-jihadi hacker The Jester (th3j35t3r) has been deleted and the hacktivist's Twitter account has been mysteriously taken down, and the events have sent the Twittersphere into a frenzy of conjecture... Has The Jester been doxed?
May 10, 2012 Added by:Headlines
“NASA security officials detected an intrusion into the site on April 20... The agency takes the issue of IT security very seriously and at no point was sensitive or controlled information compromised. NASA has made significant progress to better protect the agency’s IT systems..."
May 09, 2012 Added by:Headlines
Critics of DDoS attacks conducted by movements like Anonymous have long held that it is hypocritical to profess the defense of free speech by engaging in a tactic that undermines one's right to freely communicate, whether the interest is sociopolitical or an effort to engage in commerce...
May 04, 2012 Added by:Pierluigi Paganini
Anonymous must be analyzed with a multidisciplinary approach, it is an amorphous creature that quickly changes and is able to adapt its behavior to the context needed for successful attacks, thanks to the large and heterogeneous participation in its collective...
May 03, 2012 Added by:Pierluigi Paganini
While attention is focused on Iran and its quarrel with the West, other silent battles are being fought. In the last month, there has been a surprising level of activity between China and the Philippines, with reciprocal attacks via bits and bytes. Are we witnessing a cyber conflict?
May 03, 2012 Added by:Headlines
A new hacktivist group claims to have breached the systems of multiple government, military and private organizations. The hackers posted screenshots of their intrusions to support their claims, as well as posting what is characterized as military files for access on MediaFire...
April 25, 2012 Added by:Robert Siciliano
UFC President issued the challenge to hackers because he supports SOPA and PIPA, and UFC.com was hacked. Kicking a hornets’ nest isn’t advisable, and neither is taunting criminal hacktivists who have lots of time and resources to make your business network a target...
How to Manage Secure Communications in M2M E... Charles Devon on 03-05-2015
Seven “Sins” of Cyber Security... John Terry on 03-05-2015
Update 3: Hackers May Leak Norton Antivirus ... Jhun Astillero on 03-05-2015