Hacktivism

Hacktivism | News, how-tos, features, reviews, and videos

clicks pageviews traffic denial of service ddos attack

Imperva: Application layer DDoS attacks are on the rise

Application layer DDoS attacks are becoming more common, perhaps because they cost less for malicious actors to execute and can more effectively evade defenses than network layer attacks, Imperva says.

Fake attacks by insiders to fool companies

Famous cybercrime groups and hacktivists “brands” may be a smokescreen to cover sophisticated insider attacks.

NSA headquarters

NSA hacked? Top cyber weapons allegedly go up for auction

An anonymous group claims to have stolen hacking tools that might belong to the NSA and is auctioning them off to the highest bidder.

GCHQ

UK government hit with new complaint about hacking abroad

A group of privacy advocates and internet providers has filed a new challenge to the UK government's use of bulk hacking abroad.

hacker mit laptop vor einsen und nullen   2016   green

The advanced security techniques of criminal hackers

InfoWorld talks with Digital Shadows' Rick Holland about the security tools hackers use to protect themselves while ripping you off

01 dnc

Why the attack on the DNC won't be the last one like it

Recorded Future has outlined a series of hacks targeting both campaigns over the past twelve months. The truth is that hackers have taken an interest in democracy and the electoral process for some time.

black hat logo

Black Hat basics: Ruminations on 19 years of Black Hat Briefings

As this is my first venture into the world of blogs for CSO, the timing coincides with one of my favorite summer activities—traveling each August to the American desert, to roast in the Nevada sun, and attend the Black Hat Briefings....

game of thrones

Game of Thrones can teach you valuable security lessons

With new hacking techniques, malware, viruses and threats being created faster than Melisandre’s demon babies, the web is indeed dark and full of terrors. Here are seven lessons for security managers pulled straight out of Westeros. ...

dnc congressional candidates

FBI said to investigate possible hack of another Democratic Party organization

The FBI is said to be investigating yet another suspected hack of a Democratic Party organization, this time of the Democratic Congressional Campaign Committee that raises funds for Democrats running for the House of Representatives.

aviation industry

Cyberespionage group Patchwork sets its sights on multiple industries

A cyberespionage group known for targeting diplomatic and governmental institutions has branched out into many other industries, including aviation, broadcasting, and finance, researchers warn.

01 history

The history of ransomware

See more than 20 variants of these attacks through the years.

dollar store

An online market that offered cheap hacked servers returns

A website that offered access to hacked servers for as little as $6 is back online.

11 signs your kids is hacking -- and what to do about it

11 signs your kid is hacking -- and what to do about it

Here’s how to find out if your child is involved in malicious online activity -- before the authorities do

hacker

A hacker wants to sell 10 million patient records on the black market

A hacker claims to have stolen close to 10 million patient records and is selling them for about $820,000.

20151005 cisco headquarters sign

Flaws expose Cisco small-business routers, firewalls to hacking

Three models of Cisco wireless VPN firewalls and routers from the small business RV series contain a critical unpatched vulnerability that attackers can exploit remotely to take control of devices.

law books

10 ways law firms can make life difficult for hackers

Everybody is a target of cybercrime, but some are more attractive than others. Law firms rank pretty high on the list because of the sensitivity of the information they handle, and their sometimes very rich and powerful clientele.

taxi passenger

Uber fraud: Scammer takes the ride, victim gets the bill

Some users of the ride-hailing service Uber have found themselves being charged for “ghost” rides they never ordered, since their credentials were stolen and sold on the Dark Web. Experts say better security practices by the company...

morgue

Hacking Team postmortem is something all security leaders should read

Hacking Team is back in the news again. Last weekend, the person responsible for Hacking Team's meltdown posted a recap of the incident, including a detailed overview of how they hacked the Italian firm. It's a fascinating read on its...

young executive at laptop being watched by hacker

Blackhole exploit kit author sent to jail: Pyrrhic victory for the cybersecurity industry

The imprisonment is rather a defeat than a victory for our industry if we carefully look into the details.

isis flag graphic

Pro-Daesh hackers target Wisconsin government websites

An Algeria-based group calling itself Team System DZ spent most of last week spreading Daesh propaganda, defacing 88 domains in just three days. Among the defacements were domains used by Wisconsin’s Richland County government, which...

Load More
You Might Also Like