hacktivism
Researcher offers free voice and text encryption app to Egyptians
The explosive situation in Egypt has mobilized many repression-hating individuals in the world to try to do something to support the country’s citizens in their efforts …
HBGary breach revelations and repercussions
A few days ago, the Internet group Anonymous downed security firm HBGary’s website and breached its networks, downloading a serious amount of confidential information …
HBGary’s systems and website hacked by Anonymous
Following HBGary Federal’s COO Aaron Barr’s claim that he discovered the identities of Anonymous’ leaders through the use of social networks, the internet …
5 men busted in relation to Anonymous DDoS attacks
Five men believed to have taken part in recent Anonymous’ DDoS attacks have been arrested this morning during a series of raids coordinated by the Metropolitan Police …
Protesters organize via social networks, governments move to block them
The wave of nation-wide protests that ended in the Tunisian president Ben Ali’s run to Saudi Arabia was at least in part made possible by the organizers’ use of …
Mark Zuckerberg’s Facebook page hacked
An unknown hacker broke into the 26-year-old internet celebrity’s Facebook account and posted a bizarre message calling upon the firm to adopt a social cause: “Let …
“Evil” URL shortener initiates DDoS attacks
Can you believe that clicking on a shortened link can make you an involuntary and unknowing participant in a DDoS attack on a website? Ben Schmidt, a self-styled …
Hacktivism and social engineering emerge as top threats
Hacktivism and more profit-oriented malware, social engineering and malicious codes with the ability to adapt to avoid detection will be the main threats in the coming year, …
Featured news
Resources
Don't miss
- Google agrees to pay $135 million over Android data harvesting claims
- SolarWinds fixes critical Web Help Desk RCE vulnerabilities, upgrade ASAP!
- Open-source malware zeroes in on developer environments
- Hottest cybersecurity open-source tools of the month: January 2026
- A practical take on cyber resilience for CISOs