Expert: State-sponsored risk 'going up like crazy'

Hacker Tools and Techniques: Underground Sites and Hacking Groups

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Locate IP address location: How to confirm the origin of a cyberattack

    What's the best way to determine the origin of a cyberattack? Expert Nick Lewis weighs in. 

  • What can be done to keep students from becoming cybercriminals?

    When cybercriminals offer tuition payments to college students in exchange for their services, what can anyone do to intervene? Security management expert Mike Rothman suggests some strategies. 

  • What security measures can be taken to stop crimeware kits?

    Enterprises that don't have thoroughly patched browsers, PDF readers, media players and other client-side software are very likely to get compromised by MPack and similar crimeware tools. Ed Skoudis explains. 

  • Has ransomware made a comeback?

    Ransomware attacks, though not very common, do occur. Ed Skoudis explains how to "negotiate" with Gpcode and other malware of this type. 

  • Has cross-site scripting evolved?

    It's astounding what is being done with browser scripts these days. In this expert Q&A, Ed Skoudis explains how today's cross-site scripting attacks are a far cry from those of a decade ago. 

  • What are the risks of logging into a botnet control channel?

    By sniffing traffic as an infected machine logs into a botnet, it may possible to see an attacker's commands. Using that information to interact with the botnet, however, is dangerous, says information security threat expert Ed Skoudis. 

  • Is the Storm worm virus still a serious threat?

    Today, attackers continue to have success with the Storm worm and its many variations, using the malware to strengthen their nasty botnets. In this Q&A, expert Ed Skoudis explains why these rather run-of-the-mill attacks are still ... 

  • Who's fighting the spyware operators?

    There are plenty of malicious hackers who use spyware to gather others' personal data, so why aren't these cybercriminals behind bars? In this Q&A, Ed Skoudis explains some of the challenges facing law enforcement. 

  • What is a logic bomb?

    A logic bomb is a dangerous piece of software designed to damage a computer or network and cause massive data destruction. In this Q&A, Ed Skoudis explains how an enterprise can prepare for a hacker's detonation. 

  • Can smurf attacks cause more than just a denial of service?

    Smurf attacks are one of the oldest denial-of-service tricks in a hacker's book. In this Q&A, expert Mike Chapple explains whether such an attacks can do more than just slow your network down.