Russia claims it can wipe out US Navy with single 'electronic bomb'
Russia has claimed it can disable the entire US Navy in one fell swoop using powerful electronic signal jamming.
Fox News Exclusive: Hacker 'Guccifer' Casts Doubt on Obama Administration's Russia Hacking Claims
Romanian hacker Marcel Lehel Lazar, weighing in from a prison 3,700 miles away on the latest diplomatic dust-up between the U.S. and Russia
Global cyber attack slows but experts see risk of fresh strikes
A global cyber attack described as unprecedented in scale forced a major European automaker to halt some production lines while hitting schools in China and ...
Anonymous - Everyone Needs to Pay Attention to This! (CERN ALERT MESSAGE 2017-2018)
Anonymous - Everyone Needs to Pay Attention to This! (CERN ALERT MESSAGE 2017-2018) JOIN US: https://goo.gl/2mQaI0 - Connect with Anonymous - Subscribe ● http://www.youtube.com/subscription_center?add...
Anonymous hacker knocks 20pc of dark web offline in campaign against child pornography
A hacker associated with Anonymous knocked a fifth of the websites on the dark web offline over the weekend in an unprecedented cyber attack that reveals how anything connected to the internet is at r...
Cyber sabotage? US govt hackers reportedly penetrate Russian infrastructure
Russia expects Washington to provide an explanation after a report claimed that Pentagon cyber-offensive specialists have hacked into Russia’s power grids, t...
Why Today’s Attacks on the Internet Are Just the Start
Thanks to powerful new botnets, hackers now have the ability to knock major companies—even whole countries—offline.
U.S. Blames Russia for Recent Hacks
The U.S. intelligence community took the extraordinary step Friday of directly accusing the Russian government of attempting to interfere in the coming U.S. elections by purposefully leaking emails ha...
‘No wonder US blaming Russians for cyber attacks’ – security expert
Hackers have been a major theme in the U.S. presidential election - and mainstream media have turned Russia into a key cyber war adversary. However just a co...
America Uses Stealthy Submarines To Hack Other Countries’ Systems
When Donald Trump effectively called for Russia to hack into Hillary Clinton's emails Wednesday, the GOP nominee's remarks touched off a (predictable) media firestorm. Here was a presidential candidat...
America’s secret arsenal
To this day it remains one of the most sophisticated and mysterious offensive operations ever launched: Stuxnet, the computer virus specifically engineered to attack Iran's nuclear reactors. Discovere...
Is Anonymous' war on ISIS doing more harm than good?
ust days after the attacks in Paris, ISIS became the target of one of the world's biggest vigilante anti-terrorism campaigns. In a widely distributed video, a figure wearing a Guy Fawkes mask publicly...
ISIS Calls Anonymous 'Idiots' As Cyber War Heats Up
ISIS has offered instructions on how to safeguard members against attacks. The militant group that has taken credit for tragic attacks on Paris over the weekend, has opened a new front in a cyber war ...
Anonymous Declares Cyber War on ISIS. Why It Matters
After claiming responsibility for the Paris terrorist attacks last week, ISIS has a new foe. Hacker collective Anonymous posted a video Saturday on YouTube in which it declared a cyber war on ISIS. I...
FBI Accused Of Paying US University For Dark Net Attack
Anonymity network Tor, notorious for illegal activity, has claimed that researchers at US Carnegie Mellon university were paid by the FBI to launch an attack on them. Tor claimed that the FBI was "out...
Russia claims it can wipe out US Navy with single 'electronic bomb'
Russia has claimed it can disable the entire US Navy in one fell swoop using powerful electronic signal jamming.
Same origin policy
In computing, the same-origin policy is an important concept in the web application security model. Under the policy, a web browser permits scripts contained in a first web page to access data in a se...
ACARM-ng (software)
ACARM-ng (Alert Correlation, Assessment and Reaction Module - next generation) is an open source IDS/IPS system. ACARM-ng is an alert correlation software which can significantly facilitate analyses o...
ACARM-ng (software) - Wikipedia
Google hacking
Google hacking is a computer hacking technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use.
Google hacking...
Computer surveillance
Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet. The monitoring is often...
Computer surveillance - Wikipedia
Vulcanbot
Vulcanbot is the name of a botnet predominantly spread in Vietnam. The botnet began to spread after the website of the Vietnamese Professionals Society (vps.org) was hacked and the legitimate Vietname...
List of digital forensics tools
During the 1980s, most digital forensic investigations consisted of "live analysis", examining digital media directly using non-specialist tools. In the 1990s, several freeware and other proprietary t...
National Information Assurance Training and Education Center
The National Information Assurance Training and Education Center (NIATEC) is an American consortium of academic, industry, and government organizations to improve the literacy, awareness, training and...
National Information Assurance Training and Education Center - Wikipedia
Chroot
A chroot on Unix operating systems is an operation that changes the apparent root directory for the current running process and its children. A program that is run in such a modified environment canno...
Cyberstalking
Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group, or an organization. It may include false accusations, defamation, slander and libel. It ma...
Security-evaluated operating system
In computing, security-evaluated operating systems have achieved certification from an external security-auditing organization, the most popular evaluations are Common Criteria (CC) and FIPS 140-2.