IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 
Definition continues below.
Hackers Reports
1 - 25 of 202 Matches Previous Page  |  Next Page
Doxware: New Ransomware Threat, or Just Extortionware Rebranded?
sponsored by Fortinet, Inc.
EGUIDE: Ransomware is on the rise, and businesses are starting to understand how they can combat it, but new threats appear every day. Inside this guide, learn whether or not doxware is a worrying new ransomware trend or a rebranding of extortionware.
Posted: 31 May 2017 | Published: 26 May 2017

Fortinet, Inc.

Computer Weekly:Global Ransomware Attack Could Be a Security Wake-Up Call
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the global WannaCry ransomware attack that spread over 150 countries – will it be the wake-up call to take cyber security seriously? Also, find out how Moscow is leading the way in smart city digitisation. And our latest buyer's guide examines customer experience management.
Posted: 22 May 2017 | Published: 23 May 2017

ComputerWeekly.com

Focus: how to avoid being hit by ransomware
sponsored by ComputerWeekly.com
EGUIDE: In this special report, we analyse the risks of ransomware and provide the latest best practice advice on how to protect your organisation from this fast-growing form of malicious software.
Posted: 18 May 2017 | Published: 18 May 2017

ComputerWeekly.com

Case Study: How the Diamond Model of Intrusion Analysis Unveiled Key Details About Malicious Activity
sponsored by ThreatConnect
WHITE PAPER: In the following case study, discover ways to gain a holistic view of threat intelligence and incident response so you can unite your entire security operations around a common defense, make informed business decisions, and more.
Posted: 01 May 2017 | Published: 01 May 2017

ThreatConnect

CW ASEAN March 2017: Raising national security standards
sponsored by TechTarget ANZ
EZINE: In this month's CW ASEAN, we describe how Singapore is improving its cyber security defenses and preparations through a partnership with British security company BAE Systems.
Posted: 10 Mar 2017 | Published: 09 Mar 2017


CW ANZ March 2017: Take cover from cyber threats
sponsored by TechTarget ANZ
EZINE: In the latest issue of CW ANZ we focus on security, with analysis of why Australian organisations are not sold on cyber insurance.
Posted: 10 Mar 2017 | Published: 09 Mar 2017


Computer Weekly – 7 March 2017: Industrial control systems pose big risk to security
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the risks to national infrastructure from vulnerabilities in industrial control systems. DevOps is growing in popularity – we find out about the organisational, process and cultural approaches to make it succeed. And we ask CIOs how they are becoming hybrid IT and digital leaders. Read the issue now.
Posted: 06 Mar 2017 | Published: 07 Mar 2017

ComputerWeekly.com

Hacking the Human Operating System
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

ComputerWeekly.com

CW500: Key trends for IT leaders in 2017 – skills, careers and recruitment
sponsored by ComputerWeekly.com
PRESENTATION: A look forward to the 12 months ahead for IT leaders and the key trends of the coming year - this presentation came from Chris Chandler, head of executive search at La Fosse Associates, discussing the skills, recruitment and career development issues affecting IT leaders.
Posted: 07 Feb 2017 | Published: 07 Feb 2017

ComputerWeekly.com

Towards more robust internetworks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

ComputerWeekly.com

Getting Ahead of Cyber Threats in 2017
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at new ways that attackers may approach cybersecurity attacks and how to bolster your defenses.
Posted: 01 Feb 2017 | Published: 01 Feb 2017

SearchSecurity.com

Financial markets regulatory outlook 2017
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

ComputerWeekly.com

Block Zero-Day Threats Before They Hit Endpoints
sponsored by McAfee, Inc.
WHITE PAPER: Learn how to block 99.5% of malware from the web and drastically reduce the amount of time and resources needed for clean-up. Create a more effective and efficient IT environment with automated intelligence built to detect zero-day malware and other emerging threats.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

McAfee, Inc.

CW ANZ - December 2016
sponsored by SearchDataCenter.com
EZINE: In this month's CW ANZ we analyse why a report predicting exponential growth in mobile virtualisation in Australia has left experts scratching their heads.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

SearchDataCenter.com

CW ASEAN November 2016
sponsored by SearchSecurity.com
EZINE: Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
Posted: 01 Nov 2016 | Published: 31 Oct 2016

SearchSecurity.com

CW ANZ November 2016
sponsored by SearchSecurity.com
EZINE: With the number of cyber incidents identified by Australian organisations more than doubling in the past year, PwC is using an online game to give enterprises first-hand experience of what it means to face a cyber attack.
Posted: 01 Nov 2016 | Published: 31 Oct 2016

SearchSecurity.com

Outsmarting Ransomware: Protect Your Money and Assets
sponsored by arcserve
WEBCAST: Watch this highly informative webinar featuring IT security leaders as they teach you how to defeat those ransomware hackers lurking in the dark of cyberspace. You'll discover preventative measure and remediation strategies to keep your organization safe.
Posted: 14 Sep 2016 | Premiered: Aug 1, 2016

arcserve

Anatomy of a Hack Disrupted
sponsored by LogRhythm, Inc.
WHITE PAPER: What if there was a way to solve these potentially devastating problems before they occurred in the first place? Access this paper to uncover a real-life situation, in which a malware attack took place but was mitigated before any damage took place.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

LogRhythm, Inc.

How to Prevent and Respond to a Healthcare Ransomware Infection
sponsored by Cisco Umbrella
EGUIDE: In this e-guide, consultant Ernie Hayden shares tips on preparing for ransomware attacks through measures like managing account privileges, as well as how to handle infections once they've happened.
Posted: 16 Feb 2017 | Published: 02 Feb 2017

Cisco Umbrella

Stop Ransomware Before it Starts
sponsored by Carbon Black
EBOOK: There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Carbon Black

The History of Ransomware
sponsored by KnowBe4
WHITE PAPER: Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

QRAT Malware-As-A-Service
sponsored by Booz Allen Hamilton
WHITE PAPER: QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.
Posted: 24 Oct 2016 | Published: 30 Jun 2016

Booz Allen Hamilton

Comparative Analysis of Cybercriminal Groups: Buhtrap, Carbanak, and Metel
sponsored by Booz Allen Hamilton
WHITE PAPER: Learn about the Buhtrap, Carbanak and Metel cybercriminal groups in this white paper. Discover background on each group's operations over the years, what sort of damage they've done and what tools they've used to accomplish their malicious objectives.
Posted: 21 Oct 2016 | Published: 23 Mar 2016

Booz Allen Hamilton

DDoS Prevention For Attacks That Bypass DNS Rerouting
sponsored by Radware
EGUIDE: In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

Radware

Here's What Your Personal Data is Going for on the Dark Web
sponsored by BMC
ANALYST REPORT: How much is your data worth? Take a good look at this underground marketplace to better understand the need for a proactive security strategy in your organization.
Posted: 09 Sep 2016 | Published: 22 Jul 2016

BMC
1 - 25 of 202 Matches Previous Page    1 2 3 4    Next Page
 
HACKERS DEFINITION (continued): …  on the home page of a Web site that gets a lot of traffic or which embodies a point-of-view that is being opposed. Or one might launch a denial-of-service attack to disrupt traffic to a particular site.A recent demonstration of hacktivism followed the death of a Chinese airman when his jet fighter collided with a U.S. surveillance plane in April 2001. Chinese and American hacktivists from both countries hacked Web sites and used them as "blackboards" for their statements. Whether hacktivism is a crime may be debated. Opponents argue that hacktivism causes damage in a forum where there is already … 
Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement