Expert: State-sponsored risk 'going up like crazy'

Hacker Tools and Techniques: Underground Sites and Hacking Groups

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Smile! You're about to be hacked

    Security experts at last week's RSA conference warn that video files may be the next great threat vector, providing enterprises some interesting 'codec moments.' 

  • Security Bytes: Microsoft frowns on iDefense hacking challenge

    Meanwhile, Google Desktop Beta carries security risk; Sophos update leads to false positives for Mac malcode; and a Kaspersky glitch causes Microsoft users e-mail trouble. 

  • Companies still not reporting attacks, FBI director says

    At a BSA Town Hall Meeting, Robert Mueller urged companies to cooperate with law enforcement if its ever to gain ground on cybercriminals. 

  • Titan Rain shows need for better training

    SANS says the Chinese-based attacks demonstrate the growing sophistication of hackers, and the need for IT admins who can articulate the dangers to execs. 

  •'s Guide to Thwarting Hacker Techniques

    This guide provides you with a plethora of tips, expert advice and Web resources that offer more in-depth information about hacker techniques and various tactics you can employ to protect your network. 

  • Busted: The inside story of 'Operation Firewall'

    A trial attorney with the Department of Justice offers an inside look at Operation Firewall, the 18-month investigation that nabbed a network of thieves responsible for 1.7 million credit card thefts. 

  • Spy vs. Spy

    Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day. 

  • Myfip's Titan Rain connection

    LURHQ researchers say the Myfip worm is a good example of the malcode Chinese hackers are using in the so-called Titan Rain attacks against U.S. government networks. 

  • Where have all the hackers gone?

    The term "hacker" runs the gamut from computer enthusiast to criminal, depending on who you ask. In this comedic, stream-of-conscience column, James Foster asks, "Am I a hacker?" 

  • Phishing for the missing piece of the CardSystems puzzle

    A banking insider examines the ties between customized phishing attacks this spring and the CardSystems breach announced soon after. Don't miss his revelations on how they're linked and what the phishers really needed.