#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity
As we move into our last (short) week before the Thanksgiving holiday, I’d like to take this chance to highlight some of the excellent work showcased our 2011 McAfee Security Journal, released this past Tuesday with articles compiled from McAfee Labs researchers and security industry thought leaders. The Journal was created as a venue to Read more…
Tags: cloud security, Friday Security Highlights, Hacktivism, McAfee Security Journal, mobile security
To celebrate the recent victory of the Tunisian Islamist party, the French satirical magazine “Charlie Hebdo” published a special issue in which it named the prophet Muhammad (also spelled Mohammad) as its editor-in-chief. Late night, the magazine’s offices in Paris were destroyed by a Molotov cocktail attack. The entire French political establishment has condemned this Read more…
Tags: hacking, Hacktivism
Following my previous blog on Francopol 2011, here are some data and slides from my own talk on the Anonymous Group. Anonymous circles are not the only component of hacktivism, merely a loose collection with the highest media profile. Other representatives of this informal protest movement include the “Indignants,” who use social networks around the Read more…
Tags: Anonymous, Hacktivism, identity exposure, identity theft
In France, July and August are the holiday season. Like my compatriots, I abandoned my workplace for several weeks in the southern sun. But I have to confess it was not an absolute desertion. From time to time, I had a quick look into French hacktivist activities. To demonstrate that hackers and hacktivists never stop, Read more…
Tags: Anonymous Group, Hackers, Hacktivism, iframe, SpyEye
Welcome to our second edition of Friday Security Highlights, a weekly roundup of top infosec news, blogs and buzz from around the web. Earlier this week, we pushed out a tweet about how excited we are to offer this blog alongside Lang Tibbils’ In Wake of the Week, another recap focused specifically on McAfee news Read more…
Tags: Focus, Friday Security Highlights, Hacktivism, intel, Patmos, social media
There are good and bad hackers. Here is a window into what they do and why: White Hat Hackers: These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure. These IT security professionals rely on a constantly evolving arsenal of Read more…
Tags: $1 million guarantee, access to live fraud resolution agents, black hat hackers, counter identity theft, credit card fraud and protection, credit fraud alerts, credit monitoring, credit monitoring and resolution, Cybercrime, cyberterrorists, data breaches, hackers steal credit card numbers and sensitive personal data, Hacktivism, identity fraud, identity fraud scams, identity protection, identity protection $1 million guarantee, identity protection fraud, identity protection surveillance, identity surveillance, identity theft, identity theft expert, identity theft fraud, identity theft protection, identity theft protection product, Identity thieves and cybercriminals, lost wallet protection, McAfee Identity Protection, McAfee security products, monitor credit and personal information, online personal data protection, personal identity theft fraud, personal information loss, personal information protection, proactive identity protection, proactive identity surveillance, restore credit and personal identity, white hat hackers, work with victim restore identity
In December, I discussed the surprising relationship between some Anonymous group members and the Russian bulletproof hosting company heihachi.net. I summarized the Spamhaus warning concerning a particular WikiLeaks mirror–mirror.wikileaks.info (92.241.190.202), which is still not referenced at wikileaks.ch–among the 1,426 official mirror sites. I also mentioned that various anonops.ru servers and IRC facilities were linked to Read more…
Tags: Cybercrime, Email & Web Security, Hacktivism
With a Russian Gang
The recent WikiLeaks disclosure of more than 250,000 U.S. State Department diplomatic cables got people worked up. Running opposite much public opinion, the main WikiLeaks defender in the hacktivism field is the “Anonymous” group. After earlier engaging in various cyberdemonstrations against copyright-protection societies, Anonymous is now fully involved in a battle against WikiLeaks’ censors and Read more…
Tags: Cybercrime, Hacktivism
Looking at computer threats from quarter to quarter remains a busy experience for us at McAfee Labs. Through the first three quarters of the year we have analyzed and cataloged more threats than in all other years combined, and the growth in both volume and sophistication of malware and attacks shows no signs of slowing. Read more…
Tags: botnet, critical infrastructure, Cybercrime, data breach, Data Protection, Email & Web Security, encryption, Endpoint Protection, facebook, global threat intelligence, Hacktivism, malware, Mobile, Operation Aurora, phishing, privacy, seo abuse, social networking, social networks, spam, sql attacks, Stuxnet, twitter, vulnerability, Web 2.0, zeus
Since the end of June, the media have been talking about a possible new magazine distributed by Al-Qaeda and promoted on various Islamic websites. One reason I was interested by this document was a message I read in some extremist forums saying it could contain viruses and spyware. In searching I found two documents. Each Read more…
Tags: Cybercrime, Hacktivism
Posts tagged under Hacktivism