Lulzsec - News, Features, and Slideshows
Lulzsec in pictures
The leader of the now-disbanded LulzSec hacking group directed members to attack targets in dozens of countries, including the U.K., Turkey, Brazil and Australia, even as he was serving as an FBI informant, according to a news report.
By Grant Gross | 02 October, 2014 07:12
The hactivist group Anonymous reacted angrily to the Internet shutdown yesterday in Syria, an act attributed to the embattled regime of Syrian President Bashar Assad in the civil war there. Anonymous basically declared war on the Syrian regime, saying it intends to obliterate "all Web assets belonging to the Assad regime that are NOT hosted in Syria," starting today.
By Ellen Messmer | 30 November, 2012 18:41
Although vendor-written, this contributed piece does not advocate a position that is particular to the author's employer and has been edited and approved by Network World editors.
By Marsh Ray, senior software development engineer at PhoneFactor | 22 December, 2011 07:25
Big business and government need to invest in data forensics and skills if they intend on fending off targeted attacks, according to analyst firm Gartner.
By Liam Tung | 26 August, 2011 07:40
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
More and more government agencies are turning to a BYOD strategy. While this can make more transactions mobile and potentially decrease IT costs, they may also make the agency vulnerable to security breaches. •One of the biggest threats is social engineering, a process by which an adversary tricks the user into offering up information or access rights. •While there are several types of social engineering to be on the lookout for, there are three dominant attacks to watch •As agencies debate expanded device and data management policies, creating a divide between personal and professional content is essential
- Sharp phone cameras play slow-motion video at 2,100 fps
- DHS data centre consolidation almost completed
- Amazon.com may be working on Etsy competitor
- BlackBerry cutting staff in smartphone unit
- In Pictures: The 8 things we’re looking for at Google I/O 2015
- In Pictures: Hot stuff - The coolest drones
- Hacked Adult Friend Finder database offered for $17,000
- Design thinking, agile development at heart of building control system
- CSIRO opens $6m metal 3D printing centre
- Telstra, Racing Victoria sign 10-year partnership
- Apple to wind back the clock to '09 with focus on quality, not features, in next OS X
- US Senate blocks NSA surveillance reform bill
- Amazon rules Gartner's magical box
- Google gives Android developers new tools for tracking app performance
- Microsoft offers Windows 10 carrot, threatens with stick