Expert: State-sponsored risk 'going up like crazy'

Hacker Tools and Techniques: Underground Sites and Hacking Groups

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Stolen data ending up in Google cache, say researchers

    Unprotected hacker drop sites are being crawled by search engines. Passwords, Social Security numbers and sensitive business information can be uncovered with a simple search. 

  • Hacker server contains thousands of sensitive business, healthcare files

    A rogue server controlled by an unsophisticated hacker contained email and web-based data stolen from thousands of personal and business computers. 

  • RSA 2008: Hacking techniques

    In this video from RSA Conference 2008, security expert Yuval Ben-Itzhak talks about the tools and techniques hackers are using to conduct attacks and some of the latest threats. 

  • The long, strange trip of the L0pht

    Six members of the L0pht flaw-finding group reunite for the first time in years to assess the current state of security, which they say hasn't improved much in the last decade. 

  • Built-in Windows commands to determine if a system has been hacked

    In this tip, contributor Ed Skoudis identifies five of the most useful Windows command-line tools for machine analysis and discusses how they can assist administrators in determining if a machine has been hacked. 

  • Exploit research: Keeping tabs on the hacker underground

    Protecting an organization against malicious hackers is a constant challenge, especially when attack methods are constantly evolving. But, according to information security threats expert Ed Skoudis, there are effective methods security pros can use ... 

  • What security measures can be taken to stop crimeware kits?

    Enterprises that don't have thoroughly patched browsers, PDF readers, media players and other client-side software are very likely to get compromised by MPack and similar crimeware tools. Ed Skoudis explains. 

  • Enterprise security in 2008: Malware trends suggest new twists on old tricks

    This year's malicious hackers are ready to add new twists to their old tricks. Taking hints from last year's range of cyber attacks and malicious code, information security expert Ed Skoudis reveals five key threats that are likely to dominate headli... 

  • Attackers abusing trusted domain names

    Researchers at Finjan Inc. say hackers are exploiting a loophole in the domain name registration process to circumvent Web site blockers and prolong the duration of their attacks. 

  • Hijacked DNS servers could allow an Internet assault

    Roger Thompson, chief technology officer of New Kingstown, Penn.-based Exploit Prevention Labs, has had a long career in the security business. In 1987, he co-founded the first Australian antivirus company, Leprechaun Software, and launched Virus Bus...