Hacker Tools and Techniques: Underground Sites and Hacking Groups

Hacker Tools and Techniques: Underground Sites and Hacking Groups News

  • December 03, 2014 03 Dec'14

    Expert: FIN4 phishing attacks show new operational sophistication

    According to one expert, the FIN4 attack group's successful advanced phishing operations prove that phishing attacks can't be thwarted solely with user awareness training.

  • November 25, 2014 25 Nov'14

    Regin malware: Why did it take so long to uncover?

    Industry observers say the unveiling of the Regin malware, which came after more than half a decade in the wild, highlights the need for better detection methods.

  • September 09, 2014 09 Sep'14

    Home Depot confirms data breach began in April

    The home improvement retailer confirms its customers' payment card data was breached in an incident that is believed to have begun in April, likely compromising millions of card accounts.

  • September 09, 2014 09 Sep'14

    Home Depot confirms data breach began in April

    The home improvement retailer confirms its customers' payment card data was breached in an incident that is believed to have begun in April, likely compromising millions of card accounts.

View All News

Hacker Tools and Techniques: Underground Sites and Hacking Groups Get Started

Bring yourself up to speed with our introductory content

  • ethical hacker

    An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit. Continue Reading

  • pre-installed malware

    Pre-installed malware is malicious software that is put on a machine before it is delivered to the user. New devices are usually assumed to be uncompromised but there are numerous reports of malware existing on new hardware. Continue Reading

  • peer-to-peer botnet (P2P botnet)

    A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker’s purpose without their owners’ knowledge.  Just as in the traditional botnet, which includes a command-and-control server, the bots are ... Continue Reading

View All Get Started

Evaluate Hacker Tools and Techniques: Underground Sites and Hacking Groups Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Product Reviews

Powered by IT Central Station View All Evaluate

Manage Hacker Tools and Techniques: Underground Sites and Hacking Groups

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Hacker Tools and Techniques: Underground Sites and Hacking Groups Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close