IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 
Definition continues below.
Hackers Reports
1 - 25 of 259 Matches Previous Page  |  Next Page
Special Report: Compromised Data in the Dark Web
sponsored by SurfWatch Labs
WHITE PAPER: This report reveals the findings of a Dark Web analysis, revealing an alarming amount of compromised data from one company alone.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SurfWatch Labs

Case Study: Achieving Next Generation Endpoint Protection
sponsored by CrowdStrike
WHITE PAPER: This case study describes how a managed care provider strengthened its security by obtaining visibility into all endpoints across the network.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Make Your Security Proactive, Not Reactive
sponsored by CrowdStrike
WHITE PAPER: This report explains how indicators of attack – suspicious behaviors that can alert organizations to a potential hacks – can be instrumental in preventing sophisticated, targeted attacks.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Cyber Attack Survival Checklist
sponsored by CrowdStrike
WHITE PAPER: This cyber-attack survival checklist will help you avoid common mistakes and eliminate deficiencies within your existing security measures.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Securing Information in the New Digital Economy
sponsored by Oracle Corporation
WHITE PAPER: This white paper teaches you how to build more effective security by focusing your attention on internal vulnerabilities.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Oracle Corporation

Web Security Threat Report 2015
sponsored by Symantec
WHITE PAPER: By using data from the most comprehensive global intelligence network in the world, this resource provides a breakdown of each type of cyber-attack and how you can prevent it.
Posted: 28 Jul 2015 | Published: 28 Jul 2015

Symantec

Beyond Malware: Detecting the Undetectable
sponsored by CrowdStrike
WHITE PAPER: This report details how successful attacks targeting high-profile government and corporate entities are able to easily bypass traditional defenses.
Posted: 27 Jul 2015 | Published: 27 Jul 2015

CrowdStrike

Cyber Risk Report: Wide Range of Financials Targets Continue to Get Hit
sponsored by SurfWatch Labs
WHITE PAPER: This report uses data from recent financial sector attacks to discuss trends in financial sector security.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

SurfWatch Labs

Cyber Risk Report: Data Breaches and the Healthcare Industry
sponsored by SurfWatch Labs
WHITE PAPER: This white paper presents cybercrime statistics and trends that can help you stay secure despite the numerous threats facing the healthcare industry.
Posted: 24 Jul 2015 | Published: 24 Jul 2015

SurfWatch Labs

8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Kony

Intelligence-Led Security: Develop a Concrete Plan
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper discusses the importance of proactive, intelligence-based security and gives suggestions for implementing it in your business.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

Implementing Strong, Comprehensive Authentication
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the capabilities of a strong, comprehensive authentication system that will keep you safe in today's threat landscape.
Posted: 17 Jul 2015 | Published: 31 Jul 2014

Symantec Corporation

2015 Information Security Trends: What's Next?
sponsored by Cyveillance, Inc.
WEBCAST: This webinar examines what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
Posted: 15 Jul 2015 | Premiered: Feb 26, 2015

Cyveillance, Inc.

Understanding today’s information security threats
sponsored by Dell SecureWorks
PODCAST: This podcast can help you gain the understanding you need to secure your organization by describing what threats your business faces and how you can combat them.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015

Dell SecureWorks

Point of Sale Insecurity: A Threat to Your Business
sponsored by SurfWatch Labs
WEBCAST: This webcast discusses the risks facing PoS machines and what you can do to make sure yours are secured..
Posted: 13 Jul 2015 | Premiered: Jun 9, 2015

SurfWatch Labs

Connecting the Server Room to the Board Room
sponsored by SurfWatch Labs
VIDEO: This video describes how an effective security intelligence application can help executives understand the security risks their business faces.
Posted: 13 Jul 2015 | Premiered: 10 Apr 2015

SurfWatch Labs

Device Fingerprinting: A New Tool for Enhanced Application Protection
sponsored by Radware
WHITE PAPER: Access this white paper to learn the five common factors challenging IP-based identification and how device fingerprinting can make it easier.
Posted: 10 Jul 2015 | Published: 29 May 2015

Radware

How the Hackers Get In: Experiences from Real-Life Security Breaches
sponsored by Dell SecureWorks
PODCAST: In this Podcast, you'll find firsthand accounts of the tactics used by cybercriminals from none other than Don Smith, Technology Director for a leader in information security systems. Heighten your awareness of spear phishing and other common attacks that lead to security breaches.
Posted: 10 Jul 2015 | Premiered: Jul 10, 2015

Dell SecureWorks

Understanding Today's Information Security Threats
sponsored by Dell SecureWorks
VIDEO: This video can help you understand what information security threats your organization faces and how you can best combat them.
Posted: 10 Jul 2015 | Premiered: 10 Jul 2015

Dell SecureWorks

Navigating the Pitfalls of Attack Prevention: A Look at Employee Perception
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This report takes a look at an employee's perspective on why enterprise security measures are not where they should be, and what could be done to advance them.
Posted: 08 Jul 2015 | Published: 31 Dec 2014

BAE Systems Applied Intelligence (formerly SilverSky)

IBM 2015 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This cybercrime report provides data on the sources and frequency of cybercrime so you know what to protect yourself from.
Posted: 08 Jul 2015 | Published: 31 May 2015

IBM

How the Hackers Get In: Experiences from Real-Life Security Breaches
sponsored by Dell SecureWorks
VIDEO: In this video, an information security expert discusses the results of his research to reveal hackers' most common motives and techniques.
Posted: 08 Jul 2015 | Premiered: 08 Jul 2015

Dell SecureWorks

Cybersecurity: The New Agenda
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: In this white paper, recognized security expert Jim Anderson discusses how organizations need to change in order to protect themselves in the new threat landscape.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

BAE Systems Applied Intelligence (formerly SilverSky)

Fast Detection & Deep Understanding: Responding Effectively to Cyber Attacks
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper discusses the importance of the relationship between threat identification and security intelligence, and gives tips on how you can improve both of these factors.
Posted: 07 Jul 2015 | Published: 31 Dec 2013

BAE Systems Applied Intelligence (formerly SilverSky)

Tackling Cyber-Enabled Financial Fraud
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper analyzes the problem of increased cyber-fraud and discusses how you can take back control of your organization's finances.
Posted: 06 Jul 2015 | Published: 31 Dec 2013

BAE Systems Applied Intelligence (formerly SilverSky)
1 - 25 of 259 Matches Previous Page    1 2 3 4    Next Page
 
HACKERS DEFINITION (continued): …  on the home page of a Web site that gets a lot of traffic or which embodies a point-of-view that is being opposed. Or one might launch a denial-of-service attack to disrupt traffic to a particular site.A recent demonstration of hacktivism followed the death of a Chinese airman when his jet fighter collided with a U.S. surveillance plane in April 2001. Chinese and American hacktivists from both countries hacked Web sites and used them as "blackboards" for their statements. Whether hacktivism is a crime may be debated. Opponents argue that hacktivism causes damage in a forum where there is already … 
Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement