Expert: State-sponsored risk 'going up like crazy'

Hacker Tools and Techniques: Underground Sites and Hacking Groups

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • If e-thieves want your vote, they can have it

    This week in Security Blog Log, researchers focus on flaws in Diebold's electronic voting machine. Attackers could easily exploit them to tamper with your vote, they claim. 

  • Online crime as ugly as ever

    At this year's Conference on Email and Antispam, one expert said that despite the increasing complexity of online scams and attacks, digital criminals are less about the technology and more about the crime. 

  • Security Blog Log: Israeli-Hezbollah war spills into cyberspace

    This week blogosphere warily watches online attacks inspired by the Mideast conflict and rants over the latest security incidents at AOL and the VA. 

  • special coverage: Black Hat 2006

    Check here regularly as reporters from and Information Security magazine post the latest news and tidbits from Black Hat 2006 in Las Vegas. 

  • Security Blog Log: Has CSI/FBI survey jumped the shark?

    Also: A sign the government may finally be getting it on information security, and Blue Pill's creator explains why the effort should be taken seriously. 

  • Is your data safe from next-generation attackers?

    In this month's issue of Information Security magazine, get everything you need to know about building an endpoint security solution in our step-by-step guide. Get the inside scoop on next-generation attackers, as we expose (and help you foil) their ... 

  • Digital doomsday can be avoided with preparation

    The U.S. Cyber Consequences Unit says enterprises must take specific measures to shore up their defenses, otherwise they could be vulnerable to attackers who not only steal data, but also manipulate it. 

  • Military students get lesson in cyberwarfare

    Students from the nation's most recognized military academies recently took part in a contest that not only tested their network defense skills, but also gave them a taste of real-world information security. 

  • How to protect your company against cybercrime

    Thanks to the Internet's inherent anonymity, widespread reach and disjointed law enforcement status, cybercriminals have a lot to gain -- and enterprises have a lot to lose. In this tip, SearchSecurity expert and malware guru Ed Skoudis describes how... 

  • Security Blog Log: Clues point to bot 'sleeper cells'

    This week, security bloggers see signs of a massive bot attack in the works, while Sunbelt Software warns of a Russian Web site selling eBay accounts.