New Search

If you are not happy with the results below please do another search

690 search results for: hackers

601

Targeted Injection Attacks on the Rise

Robert Siciliano Identity Theft Expert In the latter half of 2009, criminal hackers went from mass SQL injection campaigns to targeted attacks. SQL is abbreviation of Structured Query Language. Pronounced  ”Ess Que El” or ”Sequel”. The attackers shift in strategy focused on targeting high-profile websites, concluded Websense’s State of Internet Security report for the third and fourth quarter…

602

Meet Raoul Chiesa: UN Interregional Crime & Justice Research Inst.

Robert Siciliano Identity Theft Expert In my quest to learn more about what makes a criminal hacker tick, I came across Mr Chiesa when he commented on a blog post I wrote “How I Wasted 4 Hours with a Criminal Hacker”. He warned me I was treading on dangerous ground due to the fact that…

603

10 Business Identity Theft Risks in 2010

Robert Siciliano Identity Theft Expert Advancements in technology over the past decade have created a tremendous amount of opportunity for the savvy businessperson. Whether it’s mobility, streamlined processes, marketing, or the ability to sell to a global market, there’s never been a better time to be in business. Like anything good, there is always a…

604

Google Gets Hacked & What It Means to You

Robert Siciliano Identity Theft Expert Google disclosed that it had been breached by Chinese hackers, who were apparently targeting Chinese dissidents: “The cyber-assault came to light on Tuesday when Google disclosed to the public that the Gmail Web service was targeted in a highly-organized attack in late December. Google said that the intrusion attempt originated…

605

Protect Yourself from Social Engineering

Robert Siciliano Identity Theft Expert Social engineering is the act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes…

606

How to Hack a Corporate Network…with Facebook

Robert Siciliano Identity Theft Expert There’s a lot of excessive trust in the Facebook world. People have entirely dropped their sense of cynicism when logged on. They have no reason to distrust. People who are your “Friends” are generally those who you “know, like and trust”. In this world, your guard is as down as…

607

How I Wasted 4 Hours with a Criminal Hacker

Robert Siciliano Identity Theft Expert Lately I’ve been coming across “advertisements” on forums, posted by criminal hackers looking to sell our stolen information. They are “carders,” selling “dumps” and “fullz.” Well, I decided to make contact with one of them to see what the deal is. It turns out the one I connected with was…

608

ID Theft Is Set To Rise On The Heels Of The Recession

Jay McDonald from Creditcards.com does a great job of summarizing Identity Theft Predictions for 2010. “Like wolves to injured prey, identity thieves are out to turn the recession struggles of average Americans to their own advantage. “In my adult life, I’ve never seen more varations of old scams and the degree of sophistication in newer…

609

Police, DA Investigators Conduct Fake ID Sting

Robert Siciliano Identity Theft Expert Do an online search for “fake ids” and you’ll be amazed to discover how easy it can be to obtain an ID allowing you to pose as someone else. Or how easy it can be for someone else to obtain an ID that will allow him or her to pose…

610

Profile of a “REAL (Bad) HACKER HERE”

Robert Siciliano Identity Theft Expert The wild, wild web never ceases to amaze me. My daily routine includes a tremendous amount of research, keeping me on top of what’s new in information and personal security. Every day, I spend about three hours simply “consuming” information via news alerts, feeds, and subscriptions, then breaking it down…