Items Tagged with "Hacktivist"
February 25, 2011 Added by:Headlines
One of the biggest problems Khan notes is the inability of targeted entities to produce accurate information pertaining to attack attribution, citing a report by the ITRC which stated that out of the 662 registered breaches, forty percent of targets could not identify the origin of the attacks...
February 25, 2011 Added by:Headlines
That both The Jester and Anonymous attacked Westboro Baptist Church websites this week represents a very strange convergence, and the prospect that two highly active hacktivist camps might find more common ground is tantalizing to say the least...
February 24, 2011 Added by:Headlines
Anonymous members and The Jester have publicly traded jabs for several months, each threatening to undermine and expose the other's operations. Strangely enough, they may have had a meeting of the minds when it comes to their mutual disdain for the Westboro Baptist Church...
February 10, 2011 Added by:Anthony M. Freed
The fallout from the HBGary Federal breach continues to spread as leaked documents reveal that BofA was soliciting proposals for strategies to undermine WikiLeaks. The proposed strategies suggested a variety of tactics which ranged from a disinformation campaign to outright cyber attacks...
January 27, 2011 Added by:Headlines
Anonymous DDoS attackers are typically teenagers and young adults who have little or no understanding of the risks and legal repercussions that can stem from participating in the attacks, and most operate under the misconception that they can not be identified by authorities...
January 14, 2011 Added by:Headlines
"Whenever a big event occurs around the world cybercrime jumps at the chance to exploit it. And this appears to be the case with WikiLeaks and Anonymous. What an opportunity for criminals to take advantage of a volunteer army eager to take part in a struggle"...
December 28, 2010 Added by:Headlines
McAfee Labs threat research Vice President Dmitri Alperovitch has outlined his top eight picks for the security threats to be aware of over the next year. "We are seeing an escalating threat landscape in 2011," said Alperovitch...
December 11, 2010 Added by:Daniel Kennedy
The first reason is obviously the Jester’s attacks on WikiLeaks, the second more direct reason may be attacks on the Internet Relay Chat servers that Anonymous is using to coordinate attacks. They believe the Twitter account “AnonymousDown” is the same person who is behind th3j35t3r...
March 11, 2010 Added by:Anthony M. Freed
Infosec Island has once again gained exclusive access to a video demonstration of the XerXeS DoS. This new video shows a little more of the XerXeS dashboard, and reveals even more about the attack technique – watch the text box on the left as Jester mentions “Apache” for the first time outside of our private conversations.
February 22, 2010 Added by:Anthony M. Freed
Infosec Island has gained exclusive access to a video demonstration of the XerXeS DoS attack as it is unleashed on the Taliban website www.alemarah.info, and carried out by infamous patriot hacker The Jester (th3j35t3r).
February 10, 2010 Added by:Anthony M. Freed
Anti-jihadi hacker The Jester (th3j35t3r), continues his campaign against militant Islamic websites, and now reveals the development of an automated version of his DoS attack, which he calls the XerXeS project.
February 04, 2010 Added by:Anthony M. Freed
Anti-jihadi hactivist The Jester (th3j35t3r), the self-proclaimed Nicest Hacker in the World, has returned for part two of our conversation concerning his campaign of intermittent disruption of militant pro-jihad websites.
January 27, 2010 Added by:Anthony M. Freed
Recently we have witnessed the emergence of international hactivist and vigilante “the Jester” through his crusade against jihadi and militant Islamic networks...Jester’s activities raise an important question: Where do cyber vigilantes fall on the infosec ethics spectrum?