Items Tagged with "Hacktivist"
March 05, 2012 Added by:Infosec Island Admin
Asymmetric Warfare Or Annoyance? Perhaps Jester has done things in the background we do not know about and he has not reported to the media, perhaps not. Overall though, the most creative thing he has done is to poison the LOIC. THIS was a real coup and I do appreciate that one...
March 04, 2012
Conclusions of the research and analysis indicate that there is a direct and quantifiable historical linkage between the People’s Republic of China and cyber warfare. This correlation is divided into three sectors as a nation state information warfare initiative...
February 24, 2012 Added by:J. Oquendo
Common sense dictates that there is a lot of money to be made in "cyberlandia", and someone is going to make it by using any boogeyman available. Cyber is the new Gold Rush, however much of what is being portrayed by the media is blown out of proportion and unrealistic...
February 23, 2012 Added by:Infosec Island Admin
To really have an attack that merits all this hand wringing you would have to have considerable money, time, and effort. Never mind the access that one would need to innumerable systems, and this is not Anonymous even if they made boasts that they could or would do it...
February 23, 2012 Added by:Headlines
"A surprising amount of the core code originates from... 10 years ago with only a few added changes, mainly to accommodate changes in Windows versions. Many individual .exe or other files include an accompanying Word document with a detailed developer description of how it functions.."
February 22, 2012 Added by:Robin Jackson
If you are an information security professional, then I urge you to quit worrying about what conferences you're going to speak at and get serious about shoring up the defenses of every computer system that you are responsible for immediately...
February 22, 2012 Added by:Infosec Island Admin
Anonymous has never officially made a statement about attacking the power infrastructure at all. Sure, there were some drops of IP addresses in the recent past that they claimed were SCADA systems, but were only for HVAC systems. So where is the NSA getting this?
February 21, 2012 Added by:Headlines
"Grid officials said their systems face regular attacks, and they devote tremendous resources to repelling invaders, whether from Anonymous or some other source. The industry is engaged and stepping up widely to respond to emerging cyber threats..."
February 21, 2012 Added by:Infosec Island Admin
We have become a watched commodity via all means of communication. Programs have been put together with the veneer of protecting us from another 9/11 and perhaps some of them were made with the best of intentions, but this idea of monitoring social media is half baked...
February 21, 2012 Added by:Dan Dieterle
Nation State hackers are active in attacking and compromising military, government and defense contractor sites. Terrorists are using social media sites to recruit, train and spread their poison. In essence we are in a Cyber Cold War. We need a Cyber Special Forces group...
February 20, 2012 Added by:Headlines
"The attack is no longer practical. It's such a common idea that Wikipedia has a page devoted to it. For something so obvious, defenders have spent considerable time devising solutions. There are many reasons why such an attack won't cause a global blackout..."
February 17, 2012 Added by:Pierluigi Paganini
Why have they not targeted China before? Hypothetically, the structure of Anonymous could have been infiltrated and directed against the Chinese as part of a strategy defined by the West, or perhaps someone is using the name Anonymous to conduct undercover operations...
February 17, 2012 Added by:Headlines
The rogue hacktivist collective Anonymous has claimed credit for hacking and defacing several Federal Trade commission (FTC) websites in protest of the US government's support of the Anti-Counterfeiting Trade Agreement (ACTA)...
February 16, 2012 Added by:Jeffrey Carr
We should re-assess which attacks should be investigated and which should be let go. The FBI and US-CERT are overwhelmed with tracking everything from probes against government networks to DDoS attacks to targeted attacks against the Defense Industrial Base...
February 16, 2012 Added by:Infosec Island Admin
Sure, there are potential issues with regard to infrastructure and hacking/warfare, but, it is not such that we need to frame it and clothe it in the ripped flag of 9/11 do we? Obviously these guys all think so. I would beg to differ, and I find it shameful...