IT Agents  >   IT Workforce  >   Information Technology Professionals  >  


RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 
Definition continues below.
Hackers Reports
1 - 25 of 273 Matches Previous Page  |  Next Page
Stay Ahead of Attacks: Uncovering Malicious Infrastructure
sponsored by OpenDNS
WHITE PAPER: Find out how to gain a complete view of the relationships and evolution of Internet domain names, IP addresses, and autonomous systems. Continue reading to uncover the infrastructure being staged and how to identify threats before the kill chain begins.
Posted: 13 Oct 2015 | Published: 07 Oct 2015


Special Report: Threat Intelligence in Late 2015
sponsored by IBM
WHITE PAPER: This quarterly threat intelligence report reveals the newest developments in cybercrime, helping you know which threats to look out for.
Posted: 13 Oct 2015 | Published: 31 Aug 2015


Don't Wait Until Next Year to Build Better Defenses
sponsored by McAfee, Inc.
WHITE PAPER: This infographic discusses how you can implement endpoint security that's suitable for today's advanced targeted attacks.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

McAfee, Inc.

Speed Up Incident Response and Reveal Malicious IP Sources
sponsored by OpenDNS
WHITE PAPER: This breif white paper outlines how to gain great visibility and control over network traffic to uncover sophisticated threats.
Posted: 09 Oct 2015 | Published: 30 Sep 2015


Move Away from Traditional Cybersecurity
sponsored by BitDefender
VIDEO: This brief video gives you a glimpse at how your cybersecurity can look to the future instead of remaining stuck in the past.
Posted: 08 Oct 2015 | Premiered: 20 May 2015


The Forrester Wave™: DDoS Services Providers, Q3 2015
sponsored by Imperva
WHITE PAPER: Forrester Research offers unique insight into the rapidly growing DDoS Protection market with its Wave Report on DDoS Services Providers. Read the report and learn why Imperva was positioned as a leader in the DDoS service providers space.
Posted: 06 Oct 2015 | Published: 22 Jul 2015


2015 Gartner Magic Quadrant for Web App Firewall
sponsored by Imperva
WHITE PAPER: Imperva, a leading provider of cyber security solutions is once again the only leader in Gartner's Magic Quadrant for Web Application Firewall. Access the report to find out why.
Posted: 06 Oct 2015 | Published: 15 Jul 2015


2015 Global DDoS Threat Landscape Report
sponsored by Imperva
WHITE PAPER: DDoS attacks against network infrastructures continue to grow in size and duration. Download the report and learn what to expect and how you can protect your website from such attacks.
Posted: 06 Oct 2015 | Published: 06 Oct 2015


3 Essential Components for a Strong End User Security Strategy
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper discusses the three essential components of a successful security strategy and gives tips on implementing them.
Posted: 06 Oct 2015 | Published: 30 Nov 2014

Dell, Inc. and Intel®

Real-Time Protection from Advanced Web Threats
sponsored by Trustwave
WHITE PAPER: This white paper discusses how you can stay safe from web-based attacks without compromising your organization's online presence.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


Examining the Hacker's Evolution
sponsored by WhiteHat Security
WEBCAST: This webcast examines how hackers are evolving their techniques to achieve their goals faster and undetected and the top 10 attacks they use. Inside, learn how a risk based approach prioritizes vulnerabilities differently than the "high, medium, low" strategy and why it's imperative to make the switch. View now to learn more.
Posted: 01 Oct 2015 | Premiered: May 6, 2015

WhiteHat Security

Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by WhiteHat Security
WHITE PAPER: This white paper breaks down the tocal cost of web app security in the three major risk categories associated with sucessful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 01 Oct 2015 | Published: 14 Oct 2013

WhiteHat Security

Programmatically Identifying Multi-Page Flaws in Web Apps
sponsored by WhiteHat Security
WHITE PAPER: This white paper details the pros and cons of several web app scanning approaches. View now to learn learn more.
Posted: 01 Oct 2015 | Published: 31 Dec 2013

WhiteHat Security

10 Features Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This paper explains in detail the 10 features that every Web application firewall must provide.
Posted: 01 Oct 2015 | Published: 01 Oct 2015


Achieving Endpoint Protection with SANS Critical Security Controls
sponsored by Dell, Inc.
WHITE PAPER: This white paper presents twenty security controls suggested by the SANS Institute that will help you maintain endpoint security in today's complex IT environment.
Posted: 01 Oct 2015 | Published: 01 Oct 2015

Dell, Inc.

An Innovative Approach to Encrypted Network Security
sponsored by Unisys
VIDEO: This video introduces a new kind of encryption that keeps data on your network and mobile devices more secure while allowing for simple endpoint management and access.
Posted: 30 Sep 2015 | Premiered: 11 Sep 2015


Demo: Guarding against Today's Advanced Attacks
sponsored by Trend Micro
VIDEO: In this demo video, discover how you can revamp your security to guard against today's advanced attacks.
Posted: 29 Sep 2015 | Premiered: 29 Sep 2015

Trend Micro

Concern for Accidental and Malicious Data Breaches for Data Stored in New Zealand
sponsored by Unisys
WHITE PAPER: In this specific study, Unisys focused on New Zealand and uncovered the fact that most New Zealanders were just as concerned about accidental security breaches as they were with malicious attacks. What other key concerns were there? Download today and find out the facts.
Posted: 29 Sep 2015 | Published: 31 Dec 2014


IT's Confidence in Threat Defenses May Be Misplaced
sponsored by McAfee, Inc.
WHITE PAPER: This white paper uses survey results to discuss just how prepared the average organization is for a hack, and businesses need to do if they truly want to stay safe.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

McAfee, Inc.

Stealthy Tactics Define a Russian Network Security Threat Militia
sponsored by FireEye
WEBCAST: This special webinar will guide you through an in-depth analysis of HAMMERTOSS, a stealthy malware used by a cyber-threat group. View now to delve into the specific inner workings of HAMMERTOSS and the 5 stages of its attack.
Posted: 28 Sep 2015 | Premiered: Sep 16, 2015


Operation Clandestine Wolf: A Successful Zero-Day Attack Examined
sponsored by FireEye
WEBCAST: This webcast explores the anatomy of the attack and how APT3 achieved success.
Posted: 25 Sep 2015 | Premiered: Jun 24, 2015


The Art of Cyber War: A Modern Defense Strategy
sponsored by Imprivata
WHITE PAPER: In this white paper, you'll find indispensible tips on maintaining security and winning the battle against cybercrime.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


Social Threat Intelligence: A New Approach to Security
sponsored by Threatstream
TRANSCRIPT: This resource discusses social threat intelligence (STI), a collaborative approach to threat intelligence that can help you keep up with new cyber-risks.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Critical Security Controls for SSL/TLS Management
sponsored by Venafi
WHITE PAPER: In this SANS report, you'll find specific recommendations for managing SSL/TLS security and protecting your keys and certificates.
Posted: 18 Sep 2015 | Published: 30 Jun 2015


DD4BC and the Rise of Extortion
sponsored by Akamai
WEBCAST: This webcast discusses the methods, capabilities, and risks cyber-extortion groups pose to your organization.
Posted: 18 Sep 2015 | Premiered: Sep 10, 2015

1 - 25 of 273 Matches Previous Page    1 2 3 4    Next Page
HACKERS DEFINITION (continued): …  on the home page of a Web site that gets a lot of traffic or which embodies a point-of-view that is being opposed. Or one might launch a denial-of-service attack to disrupt traffic to a particular site.A recent demonstration of hacktivism followed the death of a Chinese airman when his jet fighter collided with a U.S. surveillance plane in April 2001. Chinese and American hacktivists from both countries hacked Web sites and used them as "blackboards" for their statements. Whether hacktivism is a crime may be debated. Opponents argue that hacktivism causes damage in a forum where there is already … 
Hackers definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement