Hacktivism

Hacktivism news, information, and how-to advice

iphone7 Apple store
cia cyber

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

script attack

How to get your infrastructure in shape to shake off scriptable attacks

According to F-Secure’s The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will continue as long as there are loads of...

germany flag

Police arrest man suspected of building million-router German botnet

Last year, someone turned a German internet service provider into a million-router botnet. German police think they will soon have the culprit.

kosakker russian

Hackers behind bank attack campaign use Russian as decoy

The hackers behind a sophisticated attack campaign that has targeted financial organizations around the world have intentionally inserted Russian words and commands into their malware in an attempt to throw investigators off.

Fraud gang targeted large European companies

Recent malware attacks on Polish banks tied to wider hacking campaign

Malware attacks that recently put the Polish banking sector on alert were part of a larger campaign that targeted financial organizations from over 30 countries.

img 20170203 161836

Hacker takes out dark web hosting service using well-known exploit

A major hosting service for sites on the dark web has apparently been hacked, resulting in scores of hidden sites, including those offering child pornography, going offline.

robot printer hack

Hacker hijacks thousands of publicly exposed printers to warn owners

A hacker forced thousands of publicly exposed printers to spew out rogue messages in order to warn their owners about the risks of printer hacking.

00 crimeware

A new service for the less techie criminals

Aditya K Sood, PhD, Director of Security and Cloud Threat Labs, Blue Coat Systems, a part of Symantec, details how cybercriminals can obtain sensitive data, like credit card numbers, names and addresses, with just a couple of clicks...

screen shot 2017 01 20 at 10.36.38 am

Spanish police nab suspected hacker behind Neverquest banking malware

Spanish police have arrested a suspected Russian hacker of developing the Neverquest banking Trojan, a malware targeting financial institutions across the world.

security code big data cyberespionage DDoS

DDoS-for-hire services thrive despite closure of major marketplace

The closure of a major online marketplace for paid distributed denial-of-service attacks may have done little to slowdown the illegal activities from taking place.

ukraine military tank

The group that hacked the DNC infiltrated Ukrainian artillery units

The cyberespionage group blamed for hacking into the U.S. Democratic National Committee (DNC) has also infiltrated the Ukrainian military through a trojanized Android application used by artillery units.

hacker hack

10 biggest hacks of user data in 2016

You take great pains to come up with a strong password when registering for an account on a website -- only to see your efforts go for naught when that site gets hacked. Several sites had their databases of user accounts not only...

spearfishing trap

How this analyst targeted a phisher

A potential victim tries to turn the tables on a spear phisher.

facebook magnify

Security experts divided on ethics of Facebook's password purchases

Last week, Facebook CSO Alex Stamos told conference attendees in Lisbon that the company buys stolen passwords on the black market, and some security experts are questioning the ethics and benefits of this approach.

20160224 stock mwc smartphone user in suit

Hackers can abuse LTE protocols to knock phones off networks

The new Diameter protocol that LTE mobile networks use to communicate with each other can still be abused to launch attacks against users if operators don't take additional security measures, researchers showed.

trump clinton debate three

Hillary or Donald: Who is more cybersecurity savvy?

Cybersecurity and the role of the President. What they say is one thing, what about their track record is something else altogether.

camera bots

How to stop the Army of Things

On Oct. 21, a massive distributed denial of service attack employing thousands of compromised internet connected devices brought down dozens of company websites. Private businesses must lead the offensive against the ‘Army of Things’...

russian police

Czech police arrest Russian hacker suspected of targeting the US

Police in the Czech Republic have arrested a Russian hacker suspected of targeting the U.S. for cyber crime.

Load More
You Might Also Like