Items Tagged with "Hacktivist"


7fef78c47060974e0b8392e305f0daf0

The SANS Report: The Jester: A Lesson in Asymmetric Warfare

March 05, 2012 Added by:Infosec Island Admin

Asymmetric Warfare Or Annoyance? Perhaps Jester has done things in the background we do not know about and he has not reported to the media, perhaps not. Overall though, the most creative thing he has done is to poison the LOIC. THIS was a real coup and I do appreciate that one...

Comments  (4)

F2876df2ad8d7e06cf5e558f74049bdd

The Chinese Government and PLA’s Use of Information Warfare

March 04, 2012

Conclusions of the research and analysis indicate that there is a direct and quantifiable historical linkage between the People’s Republic of China and cyber warfare. This correlation is divided into three sectors as a nation state information warfare initiative...

Comments  (3)

Bbb285308604bc5fbb9b43590d0501f6

BSidesSF: Josh Shaul on Security and Hacktivism

March 01, 2012

Josh Shaul, CTO for Application Security, Inc., took a few minutes out of his schedule at the BSides San Francisco event to discuss security issues and the mounting threats posed by hacktivist activities...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Cyber Security: The Sky is Falling

February 24, 2012 Added by:J. Oquendo

Common sense dictates that there is a lot of money to be made in "cyberlandia", and someone is going to make it by using any boogeyman available. Cyber is the new Gold Rush, however much of what is being portrayed by the media is blown out of proportion and unrealistic...

Comments  (8)

7fef78c47060974e0b8392e305f0daf0

Anonymous, Occupy, Cyber Terrorism, and Jingoistic Rhetoric

February 23, 2012 Added by:Infosec Island Admin

To really have an attack that merits all this hand wringing you would have to have considerable money, time, and effort. Never mind the access that one would need to innumerable systems, and this is not Anonymous even if they made boasts that they could or would do it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Remote Attack Code for Symantec's pcAnywhere in the Wild

February 23, 2012 Added by:Headlines

"A surprising amount of the core code originates from... 10 years ago with only a few added changes, mainly to accommodate changes in Windows versions. Many individual .exe or other files include an accompanying Word document with a detailed developer description of how it functions.."

Comments  (0)

Ecadf7bc12303bf9d93a73b5ea4a6ace

Don't Be Naïve about Anonymous or the Occupy Movement

February 22, 2012 Added by:Robin Jackson

If you are an information security professional, then I urge you to quit worrying about what conferences you're going to speak at and get serious about shoring up the defenses of every computer system that you are responsible for immediately...

Comments  (4)

7fef78c47060974e0b8392e305f0daf0

Anonymous, NSA, Power Grids and False Flags

February 22, 2012 Added by:Infosec Island Admin

Anonymous has never officially made a statement about attacking the power infrastructure at all. Sure, there were some drops of IP addresses in the recent past that they claimed were SCADA systems, but were only for HVAC systems. So where is the NSA getting this?

Comments  (1)

69dafe8b58066478aea48f3d0f384820

NSA Wary of Potential Hacktivist Threat to Power Grid

February 21, 2012 Added by:Headlines

"Grid officials said their systems face regular attacks, and they devote tremendous resources to repelling invaders, whether from Anonymous or some other source. The industry is engaged and stepping up widely to respond to emerging cyber threats..."

Comments  (3)

7fef78c47060974e0b8392e305f0daf0

Social Media Monitoring: A Rubric for Control

February 21, 2012 Added by:Infosec Island Admin

We have become a watched commodity via all means of communication. Programs have been put together with the veneer of protecting us from another 9/11 and perhaps some of them were made with the best of intentions, but this idea of monitoring social media is half baked...

Comments  (2)

B64e021126c832bb29ec9fa988155eaf

The Need for a Special Forces Offensive Cyber Group

February 21, 2012 Added by:Dan Dieterle

Nation State hackers are active in attacking and compromising military, government and defense contractor sites. Terrorists are using social media sites to recruit, train and spread their poison. In essence we are in a Cyber Cold War. We need a Cyber Special Forces group...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Planned Anonymous Attack on the Internet Likely to Fail

February 20, 2012 Added by:Headlines

"The attack is no longer practical. It's such a common idea that Wikipedia has a page devoted to it. For something so obvious, defenders have spent considerable time devising solutions. There are many reasons why such an attack won't cause a global blackout..."

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Anonymous Now Interested in the Great Firewall of China

February 17, 2012 Added by:Pierluigi Paganini

Why have they not targeted China before? Hypothetically, the structure of Anonymous could have been infiltrated and directed against the Chinese as part of a strategy defined by the West, or perhaps someone is using the name Anonymous to conduct undercover operations...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anonymous Hacks and Defaces FTC Websites

February 17, 2012 Added by:Headlines

The rogue hacktivist collective Anonymous has claimed credit for hacking and defacing several Federal Trade commission (FTC) websites in protest of the US government's support of the Anti-Counterfeiting Trade Agreement (ACTA)...

Comments  (0)

296634767383f056e82787fcb3b94864

Reflections on Suits and Spooks DC

February 16, 2012 Added by:Jeffrey Carr

We should re-assess which attacks should be investigated and which should be let go. The FBI and US-CERT are overwhelmed with tracking everything from probes against government networks to DDoS attacks to targeted attacks against the Defense Industrial Base...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

How I Learned to Stop Worrying and Love Cyberwar

February 16, 2012 Added by:Infosec Island Admin

Sure, there are potential issues with regard to infrastructure and hacking/warfare, but, it is not such that we need to frame it and clothe it in the ripped flag of 9/11 do we? Obviously these guys all think so. I would beg to differ, and I find it shameful...

Comments  (1)

Page « < 3 - 4 - 5 - 6 - 7 > »