Hacktivism

Hacktivism news, information, and how-to advice

Man laying on psychiatrists couch getting therapy

07 hacktivist anonymous

Homeless, fugitive hacker seeks asylum in Mexico

A homeless, fugitive member of Anonymous asked Mexico for asylum and 'protection from persecution perpetrated by the government of the USA.'

intro cyber attack maps

8 top cyber attack maps and how to use them

Cyber attack maps can be fun to look at, but are they useful? As usual, when it comes to security context is key, so CSO looked at eight of the web's most popular cyber-attack maps. While the maps themselves are mostly eye candy with...

Qatar skyline

Recap: News agency hack blamed for diplomatic meltdown in Qatar

Early Monday morning in Bahrain, the country's Foreign Affairs Ministry said the nation has severed diplomatic ties with Qatar. Within minutes of Bahrain's announcement, the United Arab Emirates, Saudi Arabia, and Egypt followed suit....

alert hacking threat detected

Proposed 'hack back' law would not have stopped WannaCry

On Monday, the Financial Times published a story concerning a proposed bill form Representative Tom Graves, a Republican from Georgia's 14th district. Graves has proposed changing the Computer Fraud and Abuse Act (CFAA) to allow...

1 kids intro

Teenagers who became hackers

There is of course a very long history of young people getting involved in hacking—it's become almost something of a cliché. We'll take a look at the trouble teens have managed to get into online since almost the beginning of "online"...

Three shades of hackers: The differences among the white, grey, and black hats

This infographic explains why hackers are defined by the hats they wear.

shield protection

15 tricks to hold off the hackers

To root out persistent hackers, sometimes you have to get a little creative

iot attack

A vigilante hacker may have built a computer worm to protect the IoT

Is a vigilante hacker trying to secure your IoT device from malware? The mysterious developer behind a growing computer worm wants people to think so.

iphone7 Apple store

Hackers threaten to wipe millions of Apple devices, demand ransom

A group of hackers is threatening to wipe millions of iOS devices in two weeks if Apple doesn't pay them US$150,000.

cia cyber

How to destroy angels

An Internet of Things security researcher and exploit developer's professional analysis of the progress made by the CIA in the context of the Weeping Angels smart television research project.

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

script attack

How to get your infrastructure in shape to shake off scriptable attacks

According to F-Secure’s The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will continue as long as there are loads of...

germany flag

Police arrest man suspected of building million-router German botnet

Last year, someone turned a German internet service provider into a million-router botnet. German police think they will soon have the culprit.

kosakker russian

Hackers behind bank attack campaign use Russian as decoy

The hackers behind a sophisticated attack campaign that has targeted financial organizations around the world have intentionally inserted Russian words and commands into their malware in an attempt to throw investigators off.

euro bills

Recent malware attacks on Polish banks tied to wider hacking campaign

Malware attacks that recently put the Polish banking sector on alert were part of a larger campaign that targeted financial organizations from over 30 countries.

img 20170203 161836

Hacker takes out dark web hosting service using well-known exploit

A major hosting service for sites on the dark web has apparently been hacked, resulting in scores of hidden sites, including those offering child pornography, going offline.

robot printer hack

Hacker hijacks thousands of publicly exposed printers to warn owners

A hacker forced thousands of publicly exposed printers to spew out rogue messages in order to warn their owners about the risks of printer hacking.

00 crimeware

A new service for the less techie criminals

Aditya K Sood, PhD, Director of Security and Cloud Threat Labs, Blue Coat Systems, a part of Symantec, details how cybercriminals can obtain sensitive data, like credit card numbers, names and addresses, with just a couple of clicks...

Load More