Expert: State-sponsored risk 'going up like crazy'
  • Expert: State-sponsored risk 'going up like crazy'

    Expert: State-sponsored risk 'going up like crazy'

    Former U.S. national security advisor Greg Rattray believes better cybersecurity intelligence is needed to combat a growing "Internet underground."

  • MORE HIGHLIGHTS

    Decoding the mysteries of steganography

    Expert Joe Granneman explains how steganography works, and the ways it can both protect and threaten enterprise data.

  • How to defend against an AET attack

    Expert Brad Casey explains advanced evasion techniques and details how to protect enterprise networks against the likelihood of an AET attack.

  • cold boot attack

    A cold boot attack is a process for obtaining unauthorized access to encryption keys stored in the dynamic random access memory (DRAM) chips of a c...

Hacker Tools and Techniques: Underground Sites and Hacking Groups

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Has ransomware made a comeback?

    Ransomware attacks, though not very common, do occur. Ed Skoudis explains how to "negotiate" with Gpcode and other malware of this type. 

  • Has cross-site scripting evolved?

    It's astounding what is being done with browser scripts these days. In this expert Q&A, Ed Skoudis explains how today's cross-site scripting attacks are a far cry from those of a decade ago. 

  • What are the risks of logging into a botnet control channel?

    By sniffing traffic as an infected machine logs into a botnet, it may possible to see an attacker's commands. Using that information to interact with the botnet, however, is dangerous, says information security threat expert Ed Skoudis. 

  • Is the Storm worm virus still a serious threat?

    Today, attackers continue to have success with the Storm worm and its many variations, using the malware to strengthen their nasty botnets. In this SearchSecurity.com Q&A, expert Ed Skoudis explains why these rather run-of-the-mill attacks are still ... 

  • Who's fighting the spyware operators?

    There are plenty of malicious hackers who use spyware to gather others' personal data, so why aren't these cybercriminals behind bars? In this SearchSecurity.com Q&A, Ed Skoudis explains some of the challenges facing law enforcement. 

  • What is a logic bomb?

    A logic bomb is a dangerous piece of software designed to damage a computer or network and cause massive data destruction. In this SearchSecurity.com Q&A, Ed Skoudis explains how an enterprise can prepare for a hacker's detonation. 

  • Can smurf attacks cause more than just a denial of service?

    Smurf attacks are one of the oldest denial-of-service tricks in a hacker's book. In this SearchSecurity.com Q&A, expert Mike Chapple explains whether such an attacks can do more than just slow your network down. 

  • Categorizing malware

     

  • Tracking down virus distributors for civil litigation

     

  • Fighting back against virus writers