IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 
Definition continues below.
Hackers Reports
1 - 25 of 207 Matches Previous Page  |  Next Page
CW ASEAN March 2017: Raising national security standards
sponsored by TechTarget ANZ
EZINE: In this month's CW ASEAN, we describe how Singapore is improving its cyber security defenses and preparations through a partnership with British security company BAE Systems.
Posted: 10 Mar 2017 | Published: 09 Mar 2017


CW ANZ March 2017: Take cover from cyber threats
sponsored by TechTarget ANZ
EZINE: In the latest issue of CW ANZ we focus on security, with analysis of why Australian organisations are not sold on cyber insurance.
Posted: 10 Mar 2017 | Published: 09 Mar 2017


Computer Weekly – 7 March 2017: Industrial control systems pose big risk to security
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the risks to national infrastructure from vulnerabilities in industrial control systems. DevOps is growing in popularity – we find out about the organisational, process and cultural approaches to make it succeed. And we ask CIOs how they are becoming hybrid IT and digital leaders. Read the issue now.
Posted: 06 Mar 2017 | Published: 07 Mar 2017

ComputerWeekly.com

Managing Cybersecurity Risk: How Directors and Corporate Officers Can Protect Their Businesses
sponsored by BAE Systems
WHITE PAPER: Go beyond simple risk management by implementing cybersecurity practices designed not only to prevent breaches but anticipate the damage and recover from attacks. Discover how to bolster endpoint security and data loss prevention by identifying potential attackers to improve your organization's threat awareness and put the right tools in place.
Posted: 06 Mar 2017 | Published: 06 Mar 2017

BAE Systems

SWIFT Network Communications: How Can Security Be Improved?
sponsored by BAE Systems Applied Intelligence
EGUIDE: In this e-guide, experts describe how cybercriminals are abusing the SWIFT network to steal millions of dollars. Learn what can be done to prevent systems like SWIFT from being used to defraud its clients.
Posted: 27 Feb 2017 | Published: 24 Feb 2017


Hacking the Human Operating System
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Cyber attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences. This report from Intel Security offers advice on how to mitigate these risks.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

ComputerWeekly.com

How to Prevent and Respond to a Healthcare Ransomware Infection
sponsored by Cisco Umbrella
EGUIDE: In this e-guide, consultant Ernie Hayden shares tips on preparing for ransomware attacks through measures like managing account privileges, as well as how to handle infections once they've happened.
Posted: 16 Feb 2017 | Published: 02 Feb 2017

Cisco Umbrella

CW500: Key trends for IT leaders in 2017 – skills, careers and recruitment
sponsored by ComputerWeekly.com
PRESENTATION: A look forward to the 12 months ahead for IT leaders and the key trends of the coming year - this presentation came from Chris Chandler, head of executive search at La Fosse Associates, discussing the skills, recruitment and career development issues affecting IT leaders.
Posted: 07 Feb 2017 | Published: 07 Feb 2017

ComputerWeekly.com

Towards more robust internetworks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

ComputerWeekly.com

Getting Ahead of Cyber Threats in 2017
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at new ways that attackers may approach cybersecurity attacks and how to bolster your defenses.
Posted: 01 Feb 2017 | Published: 01 Feb 2017

SearchSecurity.com

Financial markets regulatory outlook 2017
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Financial services companies will face new challenges from innovative financial technology (fintech) companies, regulatory technology (regtech) will push down compliance costs, and there will be a greater emphasis on planning for cyber breaches in 2017, Deloitte predicts in this report.
Posted: 20 Jan 2017 | Published: 20 Jan 2017

ComputerWeekly.com

7 Ways To Make Yourself Hard To Hack
sponsored by Solarwinds MSP
WHITE PAPER: Your corporate data is likely spread across devices, networks, and servers. Inside learn 7 ways to make yourself harder to hack and your data more secure. Learn how to take a layered approach to security, increase network visibility to help spot system anomalies and 5 more.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

Solarwinds MSP

Stop Ransomware Before it Starts
sponsored by Carbon Black
EBOOK: There is no single solution to beat ransomware. Learn the history behind ransomware, how it works, and what you can do to protect your valuable assets. Through proper planning and preparations, you can defend your organization and protect your valuable assets.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Carbon Black

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute
WHITE PAPER: Whether it is from human error or malicious outsiders, a diligent IT department can diminish the risk of lost or stolen data. Learn 7 best practices healthcare organizations can put in place to ensure the safety of patient information on mobile devices.
Posted: 15 Dec 2016 | Published: 31 Dec 2015

Absolute

Block Zero-Day Threats Before They Hit Endpoints
sponsored by McAfee, Inc.
WHITE PAPER: Learn how to block 99.5% of malware from the web and drastically reduce the amount of time and resources needed for clean-up. Create a more effective and efficient IT environment with automated intelligence built to detect zero-day malware and other emerging threats.
Posted: 09 Dec 2016 | Published: 30 Nov 2016

McAfee, Inc.

CW ANZ - December 2016
sponsored by SearchDataCenter.com
EZINE: In this month's CW ANZ we analyse why a report predicting exponential growth in mobile virtualisation in Australia has left experts scratching their heads.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

SearchDataCenter.com

CW ASEAN November 2016
sponsored by SearchSecurity.com
EZINE: Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.
Posted: 01 Nov 2016 | Published: 31 Oct 2016

SearchSecurity.com

CW ANZ November 2016
sponsored by SearchSecurity.com
EZINE: With the number of cyber incidents identified by Australian organisations more than doubling in the past year, PwC is using an online game to give enterprises first-hand experience of what it means to face a cyber attack.
Posted: 01 Nov 2016 | Published: 31 Oct 2016

SearchSecurity.com

Ransomware - Anatomy of an attack
sponsored by Cisco Umbrella and Dimension Data
VIDEO: Discover how an effective ransomware attack comes together in this short video based on every day events. Get inside the head of a modern day hacker and learn how they've turned a malicious hobby into a fruitful career.
Posted: 04 Oct 2016 | Premiered: 08 Sep 2016

Cisco Umbrella and Dimension Data

Outsmarting Ransomware: Protect Your Money and Assets
sponsored by arcserve
WEBCAST: Watch this highly informative webinar featuring IT security leaders as they teach you how to defeat those ransomware hackers lurking in the dark of cyberspace. You'll discover preventative measure and remediation strategies to keep your organization safe.
Posted: 14 Sep 2016 | Premiered: Aug 1, 2016

arcserve

The History of Ransomware
sponsored by KnowBe4
WHITE PAPER: Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

QRAT Malware-As-A-Service
sponsored by Booz Allen Hamilton
WHITE PAPER: QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.
Posted: 24 Oct 2016 | Published: 30 Jun 2016

Booz Allen Hamilton

Comparative Analysis of Cybercriminal Groups: Buhtrap, Carbanak, and Metel
sponsored by Booz Allen Hamilton
WHITE PAPER: Learn about the Buhtrap, Carbanak and Metel cybercriminal groups in this white paper. Discover background on each group's operations over the years, what sort of damage they've done and what tools they've used to accomplish their malicious objectives.
Posted: 21 Oct 2016 | Published: 23 Mar 2016

Booz Allen Hamilton

DDoS Prevention For Attacks That Bypass DNS Rerouting
sponsored by Radware
EGUIDE: In this e-guide, you'll uncover ways organizations can stay protected when using cloud-based DDoS prevention services. Read on to learn expert strategies from emerging business and technology director Ed Moyle.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

Radware

Here's What Your Personal Data is Going for on the Dark Web
sponsored by BMC
ANALYST REPORT: How much is your data worth? Take a good look at this underground marketplace to better understand the need for a proactive security strategy in your organization.
Posted: 09 Sep 2016 | Published: 22 Jul 2016

BMC
1 - 25 of 207 Matches Previous Page    1 2 3 4    Next Page
 
HACKERS DEFINITION (continued): …  on the home page of a Web site that gets a lot of traffic or which embodies a point-of-view that is being opposed. Or one might launch a denial-of-service attack to disrupt traffic to a particular site.A recent demonstration of hacktivism followed the death of a Chinese airman when his jet fighter collided with a U.S. surveillance plane in April 2001. Chinese and American hacktivists from both countries hacked Web sites and used them as "blackboards" for their statements. Whether hacktivism is a crime may be debated. Opponents argue that hacktivism causes damage in a forum where there is already … 
Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement