Blog Posts Tagged with "Hacktivist"
October 18, 2012 Added by:Pierluigi Paganini
Hacktivism is considered one of the main cyber threats and its operations have created serious problems to private businesses and governments, for this reason security expert all over the world are trying to deeply analyze the different movements of dissent and their mutual relationships...
October 15, 2012 Added by:Dan Dieterle
“Most did not recognise that people using fake profiles, perhaps masquerading as school friends, could capture information and movements. Few consider the possibilities of data mining and how patterns of behaviour can be identified over time..."
September 23, 2012 Added by:Pierluigi Paganini
I just returned from the Cyber Threat Summit in Dublin, The event revealed an alarming scenario on cyber threats, no matter if it is cybercrime, hacktivism, cyber terrorism or cyber warfare, all those share a worrying growth of attacks that are influencing our digital lives...
September 11, 2012 Added by:Jim Palazzolo
If you give public attention to your adversary, the stronger they get. We keep using terms like “Hacker” and “Black Hat”. I understand the need to classify the behavior. However, are we inadvertently giving individuals too much inherited power by recognizing them in context and connotation?
September 07, 2012 Added by:Rafal Los
Why am I calling this a psychological operation? From talking to people who would know - the UDID is just a tracking mechanism to link a device to a person. The fact that this has stirred such a sentiment against the federal government at a time when distrust of is already high is suspect...
September 05, 2012 Added by:Headlines
Rivera allegedly used a proxy server in an attempt to mask or hide his Internet protocol (IP) address and obtained confidential information from Sony Pictures’ computer systems using an SQL injection attack against its website...
September 04, 2012 Added by:Pierluigi Paganini
We can continue to the bitter end, but the lesson we must learn is that Anonymous has now become a part of our daily life, an element with which every security expert will have to face sooner or later. Continuing to ignore the phenomenon of hacktivism is very dangerous...
August 07, 2012 Added by:Headlines
Pro-Israeli hacker Yourikan (you-r!-k@n) is claiming to have hacked and defaced as many as ninety-one Iranian websites including government, education and business targets in protest of Iran's continued pursuit of nuclear weapons and support for terrorist activities targeting Israel...
July 31, 2012 Added by:ʞɔopuooq ʇuıɐs
I have done my best to ignore rantings, trying not to feed the trolls, but Emick recently upped her campaign against me and created a blog post berating my methods. One of my valued supporters, @render64, has read Emick's blog and kindly used intelligent analysis in order to expose what’s really going on here...
July 27, 2012 Added by:ʞɔopuooq ʇuıɐs
On this first day of Defcon, it appears my @th3j35t3r twitter account has been suspended. Coincidence? Probably not. We all know I have some pretty desperate enemies who will stop at nothing to see me inconvenienced, discredited or otherwise annoyed. So here’s the upshot...
July 11, 2012 Added by:Infosec Island Admin
We have lobbying going on between two factions and all too often, the roosters are the ones being heard with their cry that the apocalypse is upon us, our water supply has been hacked, our power grid is a spiders thread away from utter collapse and youu my friend, are about to be plunged back into a zombie apocalypse...
July 11, 2012 Added by:ʞɔopuooq ʇuıɐs
About the twitter ‘takeover’. I have to say that was clever. Even though my account wasn’t actually breached per se. The folks behind this latest attempt found an auto-RSS/Email to tweet script that uses the Twitter API and worked out a way to post to my account without actually having any physical access. Kudos...
July 03, 2012 Added by:Pierluigi Paganini
When we think of hacktivism, immediately we connect it to anonymity. In fact, those who wish to express their dissent through hacktivism most often prefer the use of anonymity. It's clear that the ultimate context in which these people can freely exchange ideas and information is through the Deep Web...
June 27, 2012 Added by:Infosec Island Admin
If Sabu was so loved by anonymous and approved of, then they have completely abdicated their core beliefs in operations and set themselves up for the fall that came with Sabu’s arrest and subsequent rolling over on everyone in the “movement” that have spawned all of the arrests we are now seeing come to trial...
June 15, 2012 Added by:Andy Willingham
You see what made me so mad? It wasn’t the release of the PII of all those innocent people, it was their reason for doing it. They reported a web site vulnerability and it wasn’t fixed, so they decided to post PII of thousands of people on the internet. Who put them in the role of deciding who wins and who loses?
June 14, 2012 Added by:Headlines
The indictment alleges that Ryan Cleary controlled a large botnet of potentially hundreds of thousands of units to conduct DDoS attacks and would rent out his botnet for certain time periods in exchange for money from individuals interested in conducting DDoS attacks targeting specific victims...
ENISA Report on Network Information Security... Iren Vonnie on 02-27-2015
The Danger of Mixing Cyber Espionage with Cy... leijon 19 on 02-27-2015
Old School On-Target NBNS Spoofing... carson Perry on 02-27-2015