Blog Posts Tagged with "Lulzsec"

69dafe8b58066478aea48f3d0f384820

FBI Issues Press Release on Anonymous - LulzSec Arrests

March 06, 2012 Added by:Headlines

Four Principal Members of “Anonymous” and “LulzSec” charged with computer hacking and fifth member pleads guilty; “AntiSec” member also charged with stealing confidential information from approximately 860,000 clients and subscribers of Stratfor...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Lulzer Sabu Turns in Top Anonymous Leadership

March 06, 2012 Added by:Headlines

Fox News reports that infamous LulzSec leader known as Sabu has been working with law enforcement for months to investigate key members of the anonymous movement, resulting in multiple arrests of key Anonymous conspirators...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

Anonymous Gets Pwned...

March 06, 2012 Added by:Kevin McAleavey

The almighty "Anonymous" has always been that the group consists of a handful of seriously talented coders and a cast of thousands of morons, and so word that our "friends" at the RBN had scored on a trending thing by linking to malware really didn't surprise me at all...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Cyber Preparedness: Paper Tigers... Aren’t We All?

February 09, 2012 Added by:Infosec Island Admin

China, Russia, Israel etc etc are all key players in the espionage world which now includes the 5th battlespace of information warfare carried out on the internet and within computer networks. To think anything else because someone asked them just how prepared “they” were for “cyberwar” is just appallingly stupid...

Comments  (0)

6d1c762d9c16395a7e258d098091ee00

Cyber Defense Weekly: Hacks, Breaches, and Disclosures

February 08, 2012 Added by:Cyber Defense Weekly

"Us law firms have been penetrated both here and abroad. Firms with offices in China and Russia are particularly vulnerable, because the foreign security services are likely to own the people who handle the the firms' physical and electronic security..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Game Theory, Anonymous Causality, and 2012

February 05, 2012 Added by:Infosec Island Admin

Over the last year we have seen an evolution within Anonymous and its various movements. The latest being the AntiSec movement, the more cohesive core of Anonymous, one that has a set group of leaders at its center, leaders with an agenda... Anarchy....

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Senate Testimony: Cyber Security as a Strategic Concern

February 02, 2012 Added by:Headlines

Testimony offered before the Senate Select Committee on Intelligence included threats to cybersecurity, the third item addressed, signifying that intrusions by state-sponsored China and Russia and independent actors like Anonymous and Lulzsec continue to be a concern...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Hacking, Children, and Ethics

January 31, 2012 Added by:Infosec Island Admin

Anarchists who want nothing more than to just sow chaos for their own nihilistic animus produced what I call the “Monkeys with guns effect”: Scattershot and useless hacks and pranks that further no other agenda than the Lulz or to sow chaos anywhere they strike...

Comments  (19)

37d5f81e2277051bc17116221040d51c

Five Tips on How to Prevent the Next Data Breach

January 28, 2012 Added by:Robert Siciliano

You may be aware of the uber techie bad boy hackers of Anonymous/LulzSec/AntiSec/WikiLeaks/ScriptKiddies and the organized web mobs of the world. Did you know they have wreaked havoc to the degree that almost a billion records have been compromised?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Sophos Releases Security Threat Report 2012

January 26, 2012 Added by:Infosec Island Admin

Sophos unveiled its latest Security Threat Report 2012, a detailed assessment of the threat landscape—from hacktivism and online threats to mobile malware, cloud computing and social network security, as well as IT security trends for this coming year...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

How to Avoid Being Miscast in a SOPA Opera

January 20, 2012 Added by:Kevin McAleavey

LOIC was originally written in C#, but a later variant was created in Javascript which permits it to be deployed from any internet connected device. LOIC and its JS variant are simple toys, but in the hands of enough people they can create a formidable DDOS attack on a site...

Comments  (2)

F29746c6cb299c1755e4087e6126a816

A Hacker Handbook: Who Are the Bad Guys?

January 19, 2012 Added by:Kelly Colgan

When the Internet was a baby, hackers were fairly homogeneous. Some were scamming businesses for personal gain, but most were simple graffiti artists – breaking into websites to splash some MS Paint. It was a way to rebel and earn credibility within the computer community...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

The Next Generation Search Engine Hacking Arsenal

January 14, 2012 Added by:Pierluigi Paganini

LulzSec and Anonymous use Google Hacking as a means of identifying vulnerable targets, as it provides a complete and regularly updated source of sensitive info. Developers and sysadmins who want to deploy applications on cloud infrastructures should be aware...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

AntiSec, Stratfor, and the Coming Insurrection

January 04, 2012 Added by:Infosec Island Admin

It may be that you invited a stranger into your home and said stranger, as I warned at DEFCON, may not have your interests in mind. The idea of Anonymous I think has been co-opted by those who have a larger political agenda that is not your own. It may be one that will do you harm...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Information Security Events from 2011

January 03, 2012 Added by:Headlines

As 2011 was such an eventful year where security is concerned, no doubt many readers will point to numerous instances where they feel an episode was overlooked that should have been included in the top ten - but hey, you have to draw the line somewhere...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Hacktivism: The End Result Versus the End Goal

December 31, 2011 Added by:Rafal Los

Unless your cave doesn't get the news, you've seen the barrage of and hacking over the past several months. If experience teaches us anything these folks are holding the final nail in the coffin of Internet freedom as it's driven in by the government they fear...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »