IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Hackers

RSS Feed   
DEFINITION: Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The individual who performs an act of hacktivism is said to be a hacktivist. A hacktivist uses the same tools and techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause. For example, one might leave a highly visible message  … 

Hackers definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Hackers Reports
26 - 50 of 214 Matches Previous Page  |  Next Page
Leading private hospital consolidates email protection to secure VIP guests’ data “Crown Jewels”
sponsored by Barracuda
CASE STUDY: Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

Data Security Predictions 2021
sponsored by Splunk
WHITE PAPER: The pandemic of 2020 created unprecedented challenges for IT security teams and initiatives. This 23-page report provides a closer look at how the Coronavirus has shaped cybersecurity and explores key data security predictions for 2021. Read on to get started.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Splunk

Security in the Fast Lane
sponsored by WhiteHat Security
WEBCAST: Today’s organizations rely on a collection of applications in order to maintain internal operations and interact with end-users. However, dangerous threats targeting data in these critical apps have emerged. Watch this webinar to learn more about the application security threat landscape, notable breaches and how to protect your apps.
Posted: 04 Dec 2020 | Premiered: Dec 4, 2020

WhiteHat Security

Are You Ready For The Next Data Explosion?
sponsored by arcserve
RESOURCE: By 2021, it’s expected than any given organization will fall victim to a ransomware attack every 11 seconds – with global costs predicted to reach $20 billion. Why such a stark rise? Data generation is skyrocketing, and with more data comes more cybercrime. Read this infographic to learn more about the next data explosion.
Posted: 01 Dec 2020 | Published: 01 Dec 2020

arcserve

Get The Green Light For Ransomware Protection
sponsored by arcserve
RESOURCE: For security pros hoping to convince business decision-makers to invest in ransomware protection, it’s critical to ‘speak their language’ by highlighting the most impactful data (revenue, consumer behavior, actual costs, etc.). Read this infographic for 7 tips to help convey the seriousness of ransomware.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

arcserve

Lose My Trust Lose My Business.
sponsored by arcserve
RESOURCE: For consumers, trust is one of most important factors when making a purchase. So, it stands to reason that organizations that fall victim to ransomware attacks experience dramatic impacts on consumer behavior. Read this infographic, which provides statistics that further illustrate the impact of ransomware on trust.
Posted: 30 Nov 2020 | Published: 30 Nov 2020

arcserve

Detecting and Defending Against SSRF
sponsored by WhiteHat Security
WEBCAST: Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

WhiteHat Security

Addressing Complexity and Expertise in Application Security Testing
sponsored by WhiteHat Security
RESEARCH CONTENT: The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

WhiteHat Security

The Rise of Credential Stuffing Attacks: How to Keep Employee Accounts Secure
sponsored by TechTarget
RESOURCE: How much to you trust the strength of every employee's password? In our brand-new guide, dive into the basics of credential theft, credential stuffing attacks, and ways you can detect & combat them to keep employee accounts secure. Please complete our online survey to receive your free copy of the guide.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

TechTarget

Are your remote workers sitting ducks?
sponsored by Mimecast
WHITE PAPER: COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organisations suggests that many are just that. Download this white paper to learn more.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Mimecast

Top COVID-19 Phishing Scams
sponsored by Inky Technology
RESOURCE: Phishing scammers have taken advantage of the frequent updates regarding COVID-19 information to use it as an entry point for their campaigns. This article, Top COVID-19 Phishing Scams, looks at the emerging threat types and what to look for to identify an attack – read on to get started.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Inky Technology

Invisible Characters
sponsored by Inky Technology
WHITE PAPER: Similar to hidden text and zero font, invisible characters is a phishing tactic designed to obscure text in order to bypass secure email gateways (SEGs). Read this edition of Understanding Phishing for a full breakdown of invisible text – including real-world examples and best practices for stopping it.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Inky Technology

GoSecure Cybersecurity Perceptions Versus Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

GoSecure

Ransomware Decoded
sponsored by Cybereason
WHITE PAPER: Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cybereason

Australia's cybersecurity game plan
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
Posted: 23 Aug 2020 | Published: 24 Aug 2020

ComputerWeekly.com

Insights into attacker activity in compromised email accounts
sponsored by Barracuda
WHITE PAPER: Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.
Posted: 12 Aug 2020 | Published: 31 Jul 2020

Barracuda

SIG - Axcess Financial Customer Story
sponsored by Cisco Umbrella
CASE STUDY: In this case study, following the journey of Axcess Financial as they partner with Cisco to address issues they were facing related to incident detection, response and remediation. Read on to learn how they overcame these challenges and the benefits of their partnership.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Cisco Umbrella

CW APAC, July 2020: Trend Watch: Security
sponsored by ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

ComputerWeekly.com

Shor's Algorithm
sponsored by Thales
WEBCAST: While quantum computing presents a tremendous opportunity, it’s not without its risks. This webinar highlights the security implications of quantum computing, including the potential cyber threats that may be used by hackers and how organizations can address them. Watch now to learn more about the quantum threat.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Thales

Royal Holloway: Man proposes, fraud disposes
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
Posted: 07 Jul 2020 | Published: 14 Jul 2020

ComputerWeekly.com

Webinar - Simplicity is the new complexity – How malware authors make attack detection simple yet complex
sponsored by Cisco Umbrella
VIDEO: Emerging malware techniques indicate that cybercriminals are favoring simple, yet complex tricks in order to successfully conduct their campaigns. Watch this video to learn more about trending threat patterns, new malware tricks and how the simplest techniques can help organizations overcome these challenges.
Posted: 02 Jul 2020 | Premiered: 01 Jun 2020

Cisco Umbrella

The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud
sponsored by Proofpoint
WHITE PAPER: With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).
Posted: 05 Jun 2020 | Published: 05 Jun 2020

Proofpoint

5 IAM Trends Shaping the Future of Security
sponsored by Beta Systems
EGUIDE: Modern identity and access management (IAM) tools, capabilities and offerings are a direct result from years of cyberthreats targeting credentials, privileged accounts and passwords. Read this e-guide to discover 5 IAM trends that are shaping the future of the cybersecurity market.
Posted: 02 Nov 2020 | Published: 28 Oct 2020

Beta Systems

Incident Response Tools: How, When & Why to Use Them
sponsored by Claranet
EGUIDE: Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Claranet

SMB Cybersecurity: The Need for Better Protection
sponsored by Kaspersky
EGUIDE: Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.
Posted: 07 Jul 2020 | Published: 01 Jul 2020

Kaspersky
26 - 50 of 214 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences