Category Archives: Hackers

Image via Flickr user Marjan Krebelj Lately we’ve been inundated with headlines of identity theft, hacked financial institutions, and general digital insecurity. It’s enough to ask why software developers can’t create the perfect code; code without vulnerabilities or room for … Continue reading

Posted in Hackers | Tagged , , , | Leave a comment

It’s been a busy month for Anonymous, the hacker/cyber-activist collective known for supporting Julian Assange’s WikiLeaks site: despite being occupied by efforts to assist anti-government protestors across the Middle East and Northern Africa (through a series of DDoS attacks on … Continue reading

Posted in Hackers | Tagged , , , | Leave a comment

Phishing scams are becoming more common with the universal spread of social media. One recent victim was a journalist, who used the incident to educate the rest of us (link). Twitter is by far the most fertile ground, due to the … Continue reading

Posted in Hackers | Tagged , , , , | Leave a comment

Interested in a computer science degree? This book list is a great one to consider reading before embarking on that degree, but it seems to be missing a few things to really be a substitute for a degree:

Posted in Hackers | Tagged , , | Leave a comment

ATMs certainly come through in times of financial need–they are yet another crutch in our increasingly technological world.  As such, they also serve as a big target for thieves and hackers.  It’s no secret that thieves can use ATM card … Continue reading

Posted in Hackers | Tagged , , , | Leave a comment

Computer forensics, also known as digital forensics, constitutes a branch of forensic science that deals with computers and digital media. More specifically, according to Computer-Forensics-Recruiter.com, an online resource for those interested in a career in the field, computer forensics is … Continue reading

Posted in Hackers | Tagged , , | Leave a comment

As we become ever more dependent on our laptops, smartphones and various other means to surf the web, internet crime continues to increase at an alarming rate. There’s no doubt that this rise in cybercrime is linked to organized crime; … Continue reading

Posted in Hackers | Tagged , , | Leave a comment

As rates of cybercrime continue to increase exponentially, law enforcement agencies will have to enhance their cyber-defenses to effectively fight online attacks. New technologies promise to play an important role in this battle for cybersecurity.  The Federal Office Systems Exposition … Continue reading

Posted in Hackers | Tagged , , , | Leave a comment

Over the past 10 years, cybercrime has been thrust into the government spotlight with new gusto. Although more attacks on government hardware have transpired than will ever be admitted, there are multiple public instances where other countries have bypassed US … Continue reading

Posted in Hackers | Tagged , , | Leave a comment

Albert Gonzalez was sentenced to 20 years in prison, the harshest punishment for a computer crime ever handed down in an American court. Yet, despite this small victory in the war on cybercrime, law enforcement officials still face major problems … Continue reading

Posted in Hackers | Tagged , , | Leave a comment

A zero day attack refers to a hole in software that is unknown to the vendor. This security hole is exploited by hackers before the vendor becomes aware and races to fix it. Uses of zero day attacks can include … Continue reading

Posted in Hackers | Tagged , , | Leave a comment

As cybersecurity concerns increasingly become front-page news, there is a burgeoning effort to combat cyberattacks with the same defensive tactics employed in traditional warfare. There is, however, a novel complication—finding the attackers in the first place—but should security efforts concentrate … Continue reading

Posted in Hackers | Tagged , , , | Leave a comment

In the wake of Gmail cyber attacks by Chinese hackers, the prevalence of cybercrime has been thrust into the international spotlight. The question should be, though, why wasn’t it a hot topic before? Cybercrime encompasses any sort of crime having … Continue reading

Posted in Hackers | Tagged , , | 1 Comment

Cybercrime is a growing problem in our technologically dependent society, costing the loss of hundreds of millions of dollars through scams and phishing schemes and exacting a heavy mental and emotional toll on those affected by instances of identity theft, … Continue reading

Posted in Hackers | Tagged , , | Leave a comment

Black hat hackers (or crackers, or sometimes just hackers if you don’t care to differentiate) are individuals with extensive computer knowledge whose purpose is to breach or bypass internet security. The general view is that, while hackers build things, black … Continue reading

Posted in Hackers | Tagged , | Leave a comment

As the economy slowly begins to recover from the recession of the last few years, businesses are reprioritizing and looking for key positions to face current challenges. One main focus, according to a recent article in the San Francisco Chronicle, … Continue reading

Posted in Hackers | Tagged , , | Leave a comment

In the most controversial information leak in recent history, international whistleblower website WikiLeaks recently released 75,000 formerly unavailable U.S. military reports detailing the war in Afghanistan. Most of the posted information consists of reports radioed in from the front line. … Continue reading

Posted in Hackers | Tagged , | Leave a comment

In the post-9/11 United States, terrorism is one threat of which every American is all too aware. As the internet becomes more important to every aspect of our lives, a new danger might soon replace the fear of traditional attacks: … Continue reading

Posted in Hackers | Tagged , , | Leave a comment

Bots, or robots, serve a command computer by carrying out automated functions at their master’s bidding. Sounds ominous, don’t you think? In fact, common uses of bots include crimes, such as denial-of-service, extortion, identity theft, spam, and fraud. Multiple infected … Continue reading

Posted in Hackers | Tagged , , | Leave a comment

The Council of the European Union is contemplating the creation of a cybercrime unit that would foster international cooperation on issues arising from technology-related matters. The centralized agency would bring together law enforcement agencies and other organizations dedicated to fighting … Continue reading

Posted in Hackers | Tagged , , , | Leave a comment

Second part of the article from the Crime Scene Investigation:Internet series has now been published by c’t magazine. This time the Action Script’s p-code deobfuscation technique is illustrated. You can read this article in German or in English.

Posted in Hackers | Tagged , | Leave a comment

It took some time, some patience and some extra samples analysed to see how the original blog post on a Flash exploit has eventually evolved into an article for a German computer magazine c’t (magazin für computertechnik). Original article in … Continue reading

Posted in Hackers | Tagged | Leave a comment

These days, bank robbers are no longer cloaked in the guise of Bonnie & Clyde, traipsing through bank vaults with machine guns. Bank robbers are faceless, stealthy criminals spread around the world accessing bank accounts through the web and siphoning … Continue reading

Posted in Hackers | Tagged , , | Leave a comment

The victory over dozens of Zeus botnets that was declared over the past couple of days may have been premature, as the Troyak-AS upstream provider that was de-peered from its upstream providers was busy finding new peers to the internet. … Continue reading

Posted in Hackers | Tagged | Leave a comment

The Bangkok Post’s article on a Malaysian man’s arrest and extradition to the U.S., charged with identity theft, a part of a prosecution begun in 2008, exposes potentially the 12th person known only by his handle “Delpiero”. The man will be extradited for … Continue reading

Posted in Hackers | Tagged | 1 Comment

Spanish law enforcement nabbed three operators of the Mariposa botnet:  “Authorities identified them by their Internet handles and their ages: “netkairo,” 31; “jonyloleante,” 30; and “ostiator,” 25.” The massive infection rate described in the article presents just another reason why you need … Continue reading

Posted in Hackers | Tagged , | 1 Comment

Zeus is an extremely effective bot builder kit designed and developed to be sold in underground markets as a cybercrime kit, enabling buyers to easily build identity theft related spyware that evades many security solutions. The writers have been known … Continue reading

Posted in Hackers | Tagged , | Leave a comment

Sometimes it’s difficult to distinquish between pranks, performance art, and hacktivists’ true political statements, and the “Anonymous” group’s latest message creates more of that confusion. In an idealistic and strongly worded video, the group is rallying an attack against the Australian government … Continue reading

Posted in Hackers | Tagged , | Leave a comment

It seems that the recent and unusually public disclosure of the Google breach (and dozens of other U.S. corporations) has turned some heads. As Google reaches out to the NSA for help to secure its networks, a prominent cybersecurity bill passed the House … Continue reading

Posted in Hackers | Leave a comment

A few days ago, Core Security Technologies reported about a new vulnerability that was discovered in all versions of VMware’s desktop products. It normally takes some time until vendors release their patches. Meanwhile, most of the researchers have not much … Continue reading

Posted in Hackers, Virus News | Tagged , | Leave a comment