Expert: State-sponsored risk 'going up like crazy'

Hacker Tools and Techniques: Underground Sites and Hacking Groups

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Echelon

    Echelon is an officially unacknowledged U.S.-led global spy network that operates an automated system for the interception and relay of electronic communications. 

  • man in the middle attack (fire brigade attack)

    A bucket brigade attack is one in which the attacker intercepts messages in a public key exchange and then retransmits them, substituting their own public key for the requested one, so that the two original parties still appear to be communicating wi... 

  • black hat

    Black hat is used to describe a hacker (or, if you prefer, cracker) who breaks into a computer system or network with malicious intent. 

  • Report: New hacking technique shields attackers

    A new report issued by UK-based security vendor Finjan shows that attackers are using IP addresses to mask a malicious Web page and avoid detection. 

  • van Eck phreaking

    Van Eck phreaking is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring and picking up the electromagnetic fields (EM fields) that are produced by the signals... 

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. 

  • What is a logic bomb?

    A logic bomb is a dangerous piece of software designed to damage a computer or network and cause massive data destruction. In this SearchSecurity.com Q&A, Ed Skoudis explains how an enterprise can prepare for a hacker's detonation. 

  • Who's fighting the spyware operators?

    There are plenty of malicious hackers who use spyware to gather others' personal data, so why aren't these cybercriminals behind bars? In this SearchSecurity.com Q&A, Ed Skoudis explains some of the challenges facing law enforcement. 

  • Can smurf attacks cause more than just a denial of service?

    Smurf attacks are one of the oldest denial-of-service tricks in a hacker's book. In this SearchSecurity.com Q&A, expert Mike Chapple explains whether such an attacks can do more than just slow your network down. 

  • Why hacking contests, 'month-of' projects don't help

    Ivan Arce, chief technology officer of Core Security Technologies in Boston, is a big proponent of penetration testing as a way for companies to find and fix their vulnerabilities. In fact, that's one of his company's main specialties. But what does ...