Expert: State-sponsored risk 'going up like crazy'

Hacker Tools and Techniques: Underground Sites and Hacking Groups

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Military students get lesson in cyberwarfare

    Students from the nation's most recognized military academies recently took part in a contest that not only tested their network defense skills, but also gave them a taste of real-world information security. 

  • Digital doomsday can be avoided with preparation

    The U.S. Cyber Consequences Unit says enterprises must take specific measures to shore up their defenses, otherwise they could be vulnerable to attackers who not only steal data, but also manipulate it. 

  • Security Blog Log: Clues point to bot 'sleeper cells'

    This week, security bloggers see signs of a massive bot attack in the works, while Sunbelt Software warns of a Russian Web site selling eBay accounts. 

  • Smile! You're about to be hacked

    Security experts at last week's RSA conference warn that video files may be the next great threat vector, providing enterprises some interesting 'codec moments.' 

  • Security Bytes: Microsoft frowns on iDefense hacking challenge

    Meanwhile, Google Desktop Beta carries security risk; Sophos update leads to false positives for Mac malcode; and a Kaspersky glitch causes Microsoft users e-mail trouble. 

  • Companies still not reporting attacks, FBI director says

    At a BSA Town Hall Meeting, Robert Mueller urged companies to cooperate with law enforcement if its ever to gain ground on cybercriminals. 

  • Titan Rain shows need for better training

    SANS says the Chinese-based attacks demonstrate the growing sophistication of hackers, and the need for IT admins who can articulate the dangers to execs. 

  • Busted: The inside story of 'Operation Firewall'

    A trial attorney with the Department of Justice offers an inside look at Operation Firewall, the 18-month investigation that nabbed a network of thieves responsible for 1.7 million credit card thefts. 

  • Myfip's Titan Rain connection

    LURHQ researchers say the Myfip worm is a good example of the malcode Chinese hackers are using in the so-called Titan Rain attacks against U.S. government networks. 

  • Where have all the hackers gone?

    The term "hacker" runs the gamut from computer enthusiast to criminal, depending on who you ask. In this comedic, stream-of-conscience column, James Foster asks, "Am I a hacker?"