Blog Posts Tagged with "Hacker"

D36d0936f0c839be7bf2b20d59eaa76d

Managing Cyber Security in Today’s Ever-Changing World

October 26, 2017 Added by:Steve Durbin

The contours of cybercriminal enterprise have grown to become specialized, like that of mainstream business, operating out of conventional office spaces, providing a combination of customer support, marketing programs, product development, and other trappings of the traditional business world.

Comments  (0)

549d6bdceeadaa2dbb3424e069276645

No Such Thing as Too Small to Hack

September 07, 2017 Added by:Avi Bartov

Technology alone does not equal security, as owners and employees must begin to realize that their websites offer a potentially immense value proposition to hackers. An SMB is definitely not too small to care.

Comments  (0)

7fc123e0c16f296ad28a8c3214506aa9

Follow the Money — Stemming Hacker Habits

June 30, 2017 Added by:Steve McGregory

Cybercriminals aren’t stopping anytime soon. Ensure you have a finger on the pulse of your network or be ready to become another notch on a hacker’s belt.

Comments  (0)

1743acee38ef6b8f211a139c25876919

Stop Doing Four Things—and Convince Your Execs and Board to Properly Fund Cybersecurity

March 28, 2017 Added by:Kevin Magee

If you want to convince your execs and board to properly fund cybersecurity, stop telling them scary stories and using Hollywood clichés to make your case.

Comments  (0)

306708aaf995cf6a77d3083885b60907

R.I.P. Barnaby Jack: Famed Hacker Dies Days Before Black Hat Conference

July 26, 2013 Added by:Mike Lennon

Well known hacker Barnaby Jack has passed away, sending a shock through the security community with the biggest hacker-focused security conference of the year just days away.

Comments  (0)

4777ea0d573c51027a097399006f228a

Not Totally Sure What Just Happened...

May 16, 2012 Added by:ʞɔopuooq ʇuıɐs

As I watched, the conspiracies mounted – one of my favorites is that Smedley is in fact me and I am cashing out or something, so I decided to up the ante. I (probably stupidly in hindsight) unpublished my blog posts and deactivated my twitter to lend credibility to Smedley's claims...

Comments  (1)

6d117b57d55f63febe392e40a478011f

Transcript: Patriot Hacker th3j35t3r Addresses USM Students

April 10, 2012 Added by:Anthony M. Freed

The hacktivist opened himself up to questions regarding his operations, methodologies and motivations - including his campaigns against radical militant websites, his take down of WikiLeaks, his tussles with Anonymous, his military service, and a variety of security issues...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Hacker Boasts of Intel Corporation Network Breach

February 13, 2012 Added by:Headlines

A hacker who goes by the handles "WeedGrower" and "X-pOSed" claims to have breached tech giant Intel and to have gained access to an Intel.com subscriber database that contains sensitive information including passwords, social security and credit card numbers...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

Symantec Gets Pwn3d: The Fallout

January 06, 2012 Added by:Kevin McAleavey

YamaTough provided Infosec Island with compelling evidence that he did indeed have the secret sauce and planned to release it in order to embarrass Symantec over Indian government policies towards obtaining source code to eavesdrop on cell phones and other communications...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Operation Hackerazzi Leads to Intrusion Indictment

October 13, 2011 Added by:Headlines

A man accused of targeting the entertainment industry by hacking into the personal e-mail accounts of celebrities was arrested after being charged with accessing protected computers without authorization, damaging protected computers, wiretapping, and aggravated identity theft...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

California's "Sextortion" Hacker Sentenced to Prison

September 06, 2011 Added by:Headlines

In addition to stealing financial information, Mijangos “read victims’ e-mails and IMs, watched them through their webcams, and listened to them through the microphones on their computers. Often, he then used the information he obtained to play psychological games with his victims...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Authorities Arrest Man Over Stock Exchange Attack

August 22, 2011 Added by:Headlines

Authorities in Hong Kong have arrested a man on suspicion of conducting a cyber attack against the Hong Kong Exchange (HKEx) nearly two weeks ago. The man was detained late last week and police seized five computers, several mobile phones, and other items, according to reports...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Harvard Researcher Arrested for Hacking MIT Network

July 22, 2011 Added by:Headlines

''Stealing is stealing whether you use a computer command or a crowbar, and whether you take documents, data or dollars. It is equally harmful to the victim whether you sell what you have stolen or give it away," said U.S. Attorney Carmen Ortiz...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Canadian Hacker Arrested for Creating Zombie Botnet

July 20, 2011 Added by:Headlines

Canadian authorities have arrested a 24 year old professional information security manager on charges of creating a botnet. Joseph Mercer also infected systems with keylogging software to harvest information, as well as software that allowed him to capture images from unsuspecting victim's webcams...

Comments  (2)

B6f0893230292b638a6419bf566dbda6

Exclusive: A Message from Gary McKinnon's Mother

July 13, 2011 Added by:cliff sull

Being left in limbo for so many years is a horrendous form of cruelty and mental torture for a crime that the High Tech Crime Unit told Gary in March 2002 would be likely to attract a sentence of 6 months community service. We live in hope of an imminent end to this nightmare...

Comments  (8)

69dafe8b58066478aea48f3d0f384820

Hacker and Alleged Anonymous Member Arrested

April 13, 2011 Added by:Headlines

The charges stem from statements the hacker made April 1st on a French television program where he bragged about hacking into networks belonging to the French Army and defense contractor the Thales Group, and then claiming he also sold stolen information on Internet black markets...

Comments  (0)

Page « < 1 - 2 - 3 > »