Hacktivism

Hacktivism | News, how-tos, features, reviews, and videos

CSO: Have you met these hackers? [slide 01]

Man laying on psychiatrists couch getting therapy

Why CISOs need to put attackers in the psychologist’s chair

Can the TV show 'Mr. Robot' teach us anything useful about how to deal with cybercrime?

07 hacktivist anonymous

Homeless, fugitive hacker seeks asylum in Mexico

A homeless, fugitive member of Anonymous asked Mexico for asylum and 'protection from persecution perpetrated by the government of the USA.'

intro cyber attack maps

8 top cyber attack maps and how to use them

Cyber attack maps can be fun to look at, but are they useful? As usual, when it comes to security context is key, so CSO looked at eight of the web's most popular cyber-attack maps. While the maps themselves are mostly eye candy with...

Qatar skyline

Recap: News agency hack blamed for diplomatic meltdown in Qatar

Early Monday morning in Bahrain, the country's Foreign Affairs Ministry said the nation has severed diplomatic ties with Qatar. Within minutes of Bahrain's announcement, the United Arab Emirates, Saudi Arabia, and Egypt followed suit....

alert hacking threat detected

Proposed 'hack back' law would not have stopped WannaCry

On Monday, the Financial Times published a story concerning a proposed bill form Representative Tom Graves, a Republican from Georgia's 14th district. Graves has proposed changing the Computer Fraud and Abuse Act (CFAA) to allow...

1 kids intro

Teenagers who became hackers

There is of course a very long history of young people getting involved in hacking—it's become almost something of a cliché. We'll take a look at the trouble teens have managed to get into online since almost the beginning of "online"...

Three shades of hackers: The differences among the white, grey, and black hats

This infographic explains why hackers are defined by the hats they wear.

shield protection

15 tricks to hold off the hackers

To root out persistent hackers, sometimes you have to get a little creative

iot attack

A vigilante hacker may have built a computer worm to protect the IoT

Is a vigilante hacker trying to secure your IoT device from malware? The mysterious developer behind a growing computer worm wants people to think so.

iphone7 Apple store

Hackers threaten to wipe millions of Apple devices, demand ransom

A group of hackers is threatening to wipe millions of iOS devices in two weeks if Apple doesn't pay them US$150,000.

Load More