Expert: State-sponsored risk 'going up like crazy'

Hacker Tools and Techniques: Underground Sites and Hacking Groups

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Chertoff warns of growing information security attacks from small cyberattack groups

    Attacks against RSA and defense contractors could be from smaller groups, not state sponsored terrorism, warns former DHS Secretary Michael Chertoff. 

  • How hacker chatter can bolster defenses

    Rob Rachwald discusses research into the cybercriminal underground and how hacker chatter can help defend against attacks. 

  • Developing a strategy for malware defense

    In this Security School lesson, expert Lenny Zeltser provides a picture of the state of the malware landscape as it pertains to SMBs, as well as a run down of the most common types of malware. He explains how malware works, what it can do and what ma... 

  • 'Anonymous' hackers take out HBGary, pilfer sensitive emails

    Security vendor, HBGary Federal, has been hacked by the group known as "Anonymous" because the firm is helping federal investigators infiltrate the group. 

  • differential power analysis (DPA)2

    A differential power analysis (DPA) attack is an exploit based on analysing the correlation between the electricity usage of a chip in a smart card and the encryption key it contains. 

  • Malware writers and memory dumping

    Jibran Ilyas and Nicholas J. Percoco of Trustwave's SpiderLabs forensics and malware research team talk about malware sophistication and memory dumping techniques. 

  • privilege escalation attack

    A privilege escalation attack is a type of network intrusion that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications. 

  • Pwn2Own

    Pwn2Own is an annual hacking competition sponsored by security vendor TippingPoint and held at the CanSecWest security conference. 

  • alternate data stream (ADS)

    An alternate data stream (ADS) is a feature of Windows New Technology File System (NTFS) that contains metadata for locating a specific file by author or title. 

  • Cluley on Operation Aurora, information security attacks

    In this video, Graham Cluley, a Security Consultant with Sophos Plc., discusses Operation Aurora and whether information security attacks are becoming more sopisticated.