Expert: State-sponsored risk 'going up like crazy'

Hacker Tools and Techniques: Underground Sites and Hacking Groups

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Exploit research: Keeping tabs on the hacker underground

    Protecting an organization against malicious hackers is a constant challenge, especially when attack methods are constantly evolving. But, according to information security threats expert Ed Skoudis, there are effective methods security pros can use ... 

  • What security measures can be taken to stop crimeware kits?

    Enterprises that don't have thoroughly patched browsers, PDF readers, media players and other client-side software are very likely to get compromised by MPack and similar crimeware tools. Ed Skoudis explains. 

  • Enterprise security in 2008: Malware trends suggest new twists on old tricks

    This year's malicious hackers are ready to add new twists to their old tricks. Taking hints from last year's range of cyber attacks and malicious code, information security expert Ed Skoudis reveals five key threats that are likely to dominate headli... 

  • Attackers abusing trusted domain names

    Researchers at Finjan Inc. say hackers are exploiting a loophole in the domain name registration process to circumvent Web site blockers and prolong the duration of their attacks. 

  • Hijacked DNS servers could allow an Internet assault

    Roger Thompson, chief technology officer of New Kingstown, Penn.-based Exploit Prevention Labs, has had a long career in the security business. In 1987, he co-founded the first Australian antivirus company, Leprechaun Software, and launched Virus Bus... 

  • Proposed legislation would strengthen cybercrime laws

    A bill introduced in the U.S. Senate aims to close loopholes exploited by Internet criminals. 

  • Has ransomware made a comeback?

    Ransomware attacks, though not very common, do occur. Ed Skoudis explains how to "negotiate" with Gpcode and other malware of this type. 

  • Virtual Honeypots: From Botnet Tracking to Intrusion Detection

    In Chapter 11 of Virtual Honeypots: From Botnet Tracking to Intrusion Detection, authors Niels Provos and Thorsten Holz get inside the botnet and reveal some interesting conclusions. 

  • How Russia became a malware hornet's nest

    Security experts Eugene Kaspersky and Gadi Evron explain how the Russian economy and lax police work helped make it a malware hotbed. 

  • Has cross-site scripting evolved?

    It's astounding what is being done with browser scripts these days. In this expert Q&A, Ed Skoudis explains how today's cross-site scripting attacks are a far cry from those of a decade ago.