IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 
Definition continues below.
Hackers Reports
1 - 25 of 222 Matches Previous Page  |  Next Page
CW ANZ - December 2016
sponsored by SearchDataCenter.com
EZINE: In this month's CW ANZ we analyse why a report predicting exponential growth in mobile virtualisation in Australia has left experts scratching their heads.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

SearchDataCenter.com

Ransomware: 3 Seconds to Encryption
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Discover eye-opening ransomware statistics and figures in this short infographic. You'll learn just how rampant the ransomware problem has become among small businesses, but also discover how you can protect your organization to combat ransomware effectively.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Insider’s Guide to Defeating Ransomware: Protect Your Data at its Source
sponsored by Imperva
WHITE PAPER: Given the speed at which ransomware impacts organizations, security teams need to detect ransomware at the earliest stage possible. Learn how monitoring access to data on corporate file shares in real time can help you efficiently detect suspicious file modifications, allowing you to detect -- and block -- a ransomware attack.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Imperva

Making DDoS Mitigation Part of Your Incident Response Plan - Critical Steps and Best Practices
sponsored by Akamai
WHITE PAPER: The time to prepare yourself for a DDoS attack was yesterday. Discover why distributed denial of service (DDoS) attacks are so damaging to organizations and understand what you can do to protect your company today.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Akamai

10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: Where traditional firewalls have failed, web application firewalls provide strong, thorough protection. Uncover the top 10 features your team should consider when it comes to web application firewall adoption.
Posted: 14 Nov 2016 | Published: 14 Nov 2016

Imperva

Definitive Guide to Security Intelligence and Analytics
sponsored by LogRhythm, Inc.
WHITE PAPER: Security intelligence and analytics are key to uncovering and recovering from major cyberattacks. Learn how to be smart about detection and prevention, from surveying the cyberattack lifecycle to selecting the right security tool.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

LogRhythm, Inc.

IIA: Stronger Cybersecurity Starts With a Data and Analytics Strategy
sponsored by SAS
WHITE PAPER: Discover why security analytics is the key to cyber security efficiency. It provides the necessary and timely visibility into network behavior and enables devices and entities acting suspiciously to be quickly identified and investigated.
Posted: 10 Nov 2016 | Published: 31 Oct 2016

SAS

CW ASEAN November 2016
sponsored by SearchSecurity.com
EZINE: Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
Posted: 01 Nov 2016 | Published: 31 Oct 2016

SearchSecurity.com

CW ANZ November 2016
sponsored by SearchSecurity.com
EZINE: With the number of cyber incidents identified by Australian organisations more than doubling in the past year, PwC is using an online game to give enterprises first-hand experience of what it means to face a cyber attack.
Posted: 01 Nov 2016 | Published: 31 Oct 2016

SearchSecurity.com

Securing and Monitoring Access to Office 365
sponsored by Imperva
WHITE PAPER: Discover how to best secure and monitor your Office 365 users to fully realize its benefits. Learn why Office 365 is quickly becoming a target for many hackers as well as the challenges involved with securing it.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

Imperva

Comparative Analysis of Cybercriminal Groups: Buhtrap, Carbanak, and Metel
sponsored by Booz Allen Hamilton
WHITE PAPER: Learn about the Buhtrap, Carbanak and Metel cybercriminal groups in this white paper. Discover background on each group's operations over the years, what sort of damage they've done and what tools they've used to accomplish their malicious objectives.
Posted: 21 Oct 2016 | Published: 23 Mar 2016


Why You Need to Test All Your Cloud, Mobile and Web Applications
sponsored by Trustwave
WHITE PAPER: Uncover the importance of complete application testing and find recommendations on how to beat the challenges associated with protecting all web applications. Learn how to prioritize testing to receive the greatest ROI and manage your risk without a huge monetary investment.
Posted: 18 Oct 2016 | Published: 31 Dec 2014

Trustwave

Ransomware - Anatomy of an attack
sponsored by Cisco
VIDEO: Discover how an effective ransomware attack comes together in this short video based on every day events. Get inside the head of a modern day hacker and learn how they've turned a malicious hobby into a fruitful career.
Posted: 04 Oct 2016 | Premiered: 08 Sep 2016

Cisco

2016 Cost of Data Breach Study: Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)
Posted: 26 Sep 2016 | Published: 30 Jun 2016

IBM

Kona Client Reputation
sponsored by Akamai
WHITE PAPER: Discover the business benefits and operational benefits you can achieve by adding a new, advanced algorithm to your security infrastructure. Profile malicious users before they have a chance to infect your network.
Posted: 26 Sep 2016 | Published: 31 Dec 2015

Akamai

Safeguarding Vital Data Is a Battle You Can Win
sponsored by Intel Security
WHITE PAPER: In this resource, uncover what it means to develop data management and protection policies that reach from the core of the business out to mobile devices, the cloud and beyond. Also, learn how to be ready for whatever security challenges the world sends your way.
Posted: 24 Sep 2016 | Published: 24 Sep 2016

Intel Security

Give Your Threat Counter-Measures a Shot in the Arm
sponsored by Fortinet, Inc.
WHITE PAPER: Discover a deep (but concise) look at the current evolution of the modern security landscape: giving a succinct rundown of why attacks are stronger than ever, how to develop a strategic defense, and what to look for in solutions. Gain actionable insight into prevention, detection, mitigation, and more.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Fortinet, Inc.

Outsmarting Ransomware: Protect Your Money and Assets
sponsored by arcserve
WEBCAST: Watch this highly informative webinar featuring IT security leaders as they teach you how to defeat those ransomware hackers lurking in the dark of cyberspace. You'll discover preventative measure and remediation strategies to keep your organization safe.
Posted: 14 Sep 2016 | Premiered: Aug 1, 2016

arcserve

Advanced Security Platform for Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: If your organization is looking to migrate to Microsoft Office 365, you might be wondering whether additional security is needed. Discover how to safeguard users against advanced threats and targeted attacks and gain the power to identify these attacks as they happen.
Posted: 12 Sep 2016 | Published: 01 Aug 2016

Proofpoint, Inc.

Top 5 Social Media Scams of 2016
sponsored by Proofpoint, Inc.
VIDEO: This video takes a look at the top 5 social media scams you can encounter today. Discover what methods scammers are using in 2016, including bogus surveys, fake subscription sign-ups and imposter social media accounts.
Posted: 12 Sep 2016 | Premiered: 12 May 2016

Proofpoint, Inc.

Surfacing Critical Cyber Threats Through Security Intelligence
sponsored by LogRhythm, Inc.
WHITE PAPER: Fortunately, it's possible for organizations with limited budgets and higher risk tolerances to achieve significant improvements in security maturity. Discover ways to adopt mature capabilities by building an integrated architecture.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

LogRhythm, Inc.

Anatomy of a Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: What if there was a way to solve these potentially devastating problems before they occurred in the first place? Access this paper to uncover a real-life situation, in which a malware attack took place but was mitigated before any damage took place.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

LogRhythm, Inc.

Trustwave Global Security Report
sponsored by Trustwave
WHITE PAPER: Understanding the motivations and resources of professional cybercriminals is key to defending against them. This report gives you an inside look at the business behind malware with stats from breach investigations around the world.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

Trustwave

DDoS Prevention For Attacks That Bypass DNS Rerouting
sponsored by Radware
EGUIDE: In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

Radware

Here's What Your Personal Data is Going for on the Dark Web
sponsored by BMC
ANALYST REPORT: How much is your data worth? Take a good look at this underground marketplace to better understand the need for a proactive security strategy in your organization.
Posted: 09 Sep 2016 | Published: 22 Jul 2016

BMC
1 - 25 of 222 Matches Previous Page    1 2 3 4    Next Page
 
HACKERS DEFINITION (continued): …  on the home page of a Web site that gets a lot of traffic or which embodies a point-of-view that is being opposed. Or one might launch a denial-of-service attack to disrupt traffic to a particular site.A recent demonstration of hacktivism followed the death of a Chinese airman when his jet fighter collided with a U.S. surveillance plane in April 2001. Chinese and American hacktivists from both countries hacked Web sites and used them as "blackboards" for their statements. Whether hacktivism is a crime may be debated. Opponents argue that hacktivism causes damage in a forum where there is already … 
Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement