Hacktivism

Hacktivism news, information, and how-to advice

spearfishing trap
facebook magnify

20160224 stock mwc smartphone user in suit

Hackers can abuse LTE protocols to knock phones off networks

The new Diameter protocol that LTE mobile networks use to communicate with each other can still be abused to launch attacks against users if operators don't take additional security measures, researchers showed.

trump clinton debate three

Hillary or Donald: Who is more cybersecurity savvy?

Cybersecurity and the role of the President. What they say is one thing, what about their track record is something else altogether.

camera bots

How to stop the Army of Things

On Oct. 21, a massive distributed denial of service attack employing thousands of compromised internet connected devices brought down dozens of company websites. Private businesses must lead the offensive against the ‘Army of Things’...

russian police

Czech police arrest Russian hacker suspected of targeting the US

Police in the Czech Republic have arrested a Russian hacker suspected of targeting the U.S. for cyber crime.

earth explosion

Taking down the internet: possible but how probable?

Security guru Bruce Schneier reported recently that the companies that maintain the “backbone” of the internet have been under increasing attacks designed to test their defenses. It’s the kind of thing, he said, that could mean an...

clinton foundation

Guccifer 2.0 claims to have hacked the Clinton Foundation

Hacker Guccifer 2.0 now claims to have hacked the Clinton Foundation, but the documents posted show Democratic campaign data from organizations already compromised.

nsa sign

Hackers find little demand for their stolen NSA hacking tools

The hackers who are auctioning off cyberweapons allegedly stolen from the National Security Agency appear to be growing desperate for cash.

fbi director james comey

FBI reports more attempts to hack voter registration system

The U.S. Federal Bureau of Investigation has found more attempts to hack the voter registration systems of states, ahead of national elections.

marten mickos
Q&A

HackerOne CEO: 'We’re building the world’s biggest security talent agency'

Marten Mickos is crowdsourcing security with a growing army of ethical hackers who can help your company if you’re ready to adopt a new security mindset.

data breach lessons

Who you gonna call when the crisis comes

There will be times in your career when you know that you will face a crisis. These will be times when things will go horribly and irretrievably wrong. The breach news from Yahoo yesterday is a perfect example. One question that...

torrent river

Hackers sell tool to spread malware through torrent files

Be careful with what you torrent. A new tool on the black market is helping hackers distribute malware through torrent files in exchange for a fee.

rio 2016 olympics logo rowing

Sour attackers publish health data on Olympic athletes

There is really no denying it. The Russians are still upset about the decision to ban their athletes from performing in the Olympics this year in Rio. The part that still causes me to scratch my head is that they cheated and they...

Legislation of privacy security keyboard law legal gavel court ruling

Romanian hacker Guccifer sentenced to 52 months in US prison

A Romanian hacker known as Guccifer has been sentenced to 52 months in prison after breaking into Internet accounts of about 100 U.S. citizens, including government officials.

04 insider threat

Combating insider threats faced by utilities

Today, grid operators face daily external threats from cyber hackers and criminals vandalizing or destroying company assets. While protections are in place to help prevent these external threats, utilities must realize that insiders...

hacker hacked security risk

How to handle the aftermath of being hacked

Education and planning are key, cyber-security expert Tyler Cohen Wood says.

clicks pageviews traffic denial of service ddos attack

Imperva: Application layer DDoS attacks are on the rise

Application layer DDoS attacks are becoming more common, perhaps because they cost less for malicious actors to execute and can more effectively evade defenses than network layer attacks, Imperva says.

Fake attacks by insiders to fool companies

Famous cybercrime groups and hacktivists “brands” may be a smokescreen to cover sophisticated insider attacks.

NSA headquarters

NSA hacked? Top cyber weapons allegedly go up for auction

An anonymous group claims to have stolen hacking tools that might belong to the NSA and is auctioning them off to the highest bidder.

Load More