Quantcast
Channel: Hacking – Webroot Threat Blog
Browsing all 26 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Email hacking for hire going mainstream – part three

Just as we anticipated on two occasions in 2012, managed email hacking for hire services continue popping-up at publicly accessible cybercrime-friendly communities, a trend that’s largely driven by the...

View Article



Image may be NSFW.
Clik here to view.

New underground service offers access to thousands of malware-infected hosts

Thanks to the success of multiple botnet aggregating malicious campaigns launched in the wild, cybercriminals are launching malware-infected-hosts — also known as loads — as a service type of...

View Article

Image may be NSFW.
Clik here to view.

New version of DIY Google Dorks based mass website hacking tool spotted in...

Need a compelling reason to perform search engine reconnaissance on your website, for the purpose of securing it against eventual compromise? We’re about to give you a good one. A new version of a well...

View Article

Image may be NSFW.
Clik here to view.

New E-Shop sells access to thousands of malware-infected hosts, accepts Bitcoin

Thanks to the buzz generated over the widespread adoption of the decentralized P2P based E-currency, Bitcoin, we continue to observe an overall increase in international underground market propositions...

View Article

Image may be NSFW.
Clik here to view.

DIY commercially-available ‘automatic Web site hacking as a service’ spotted...

A newly launched underground market service, aims to automate the unethical penetration testing process, by empowering virtually all of its (paying) customers with what they claim is ‘private...

View Article


An update to the Target breach theory.

It was brought to our attention that the research published had flaws. To read our response, please click here:...

View Article

Image may be NSFW.
Clik here to view.

Keeping your digital life safe at the Sochi Olympics

Digital security is not the first thing that comes to mind when thinking about during the Sochi Olympics, but should be something that is on your mind when travelling to popular areas.  Just as scams...

View Article

Image may be NSFW.
Clik here to view.

‘Hacking for hire’ teams occupy multiple underground market segments,...

In a series of blog posts published throughout 2012, we’ve been highlighting the existence of a vibrant underground market segment, namely, that of ‘hacking for hire’ services, email hacking in...

View Article


Image may be NSFW.
Clik here to view.

Hacking in Hollywood

It’s generally understood that Hollywood will always put their own spin on actions in order to help tell a story.  That’s part of the movie and TV magic, or artistic license, that directors take when...

View Article


Image may be NSFW.
Clik here to view.

Did Blackhat just break the hacker movie stereotype?

(Yes, he’s Thor in other movies, but that doesn’t mean he can’t hack in Blackhat) Blackhat is out today in theaters, and we were lucky enough to have an advanced screening of the film alongside our...

View Article

An update to the Target breach theory.

It was brought to our attention that the research published had flaws. To read our response, please click here:...

View Article

Image may be NSFW.
Clik here to view.

Keeping your digital life safe at the Sochi Olympics

Digital security is not the first thing that comes to mind when thinking about during the Sochi Olympics, but should be something that is on your mind when travelling to popular areas.  Just as scams...

View Article

Image may be NSFW.
Clik here to view.

‘Hacking for hire’ teams occupy multiple underground market segments,...

In a series of blog posts published throughout 2012, we’ve been highlighting the existence of a vibrant underground market segment, namely, that of ‘hacking for hire’ services, email hacking in...

View Article


Image may be NSFW.
Clik here to view.

Hacking in Hollywood

It’s generally understood that Hollywood will always put their own spin on actions in order to help tell a story.  That’s part of the movie and TV magic, or artistic license, that directors take when...

View Article

Image may be NSFW.
Clik here to view.

Did Blackhat just break the hacker movie stereotype?

(Yes, he’s Thor in other movies, but that doesn’t mean he can’t hack in Blackhat) Blackhat is out today in theaters, and we were lucky enough to have an advanced screening of the film alongside our...

View Article


Image may be NSFW.
Clik here to view.

Source Code for Mirai IoT Malware Released

  Recently, source code for the Internet of Things (IoT) botnet malware, Mirai, was released on hack forums. This type of malware was used last month in an historic distributed-denial-of-service (DDoS)...

View Article

An update to the Target breach theory.

It was brought to our attention that the research published had flaws. To read our response, please click here:...

View Article


Image may be NSFW.
Clik here to view.

Keeping your digital life safe at the Sochi Olympics

Digital security is not the first thing that comes to mind when thinking about during the Sochi Olympics, but should be something that is on your mind when travelling to popular areas.  Just as scams...

View Article

Image may be NSFW.
Clik here to view.

‘Hacking for hire’ teams occupy multiple underground market segments,...

In a series of blog posts published throughout 2012, we’ve been highlighting the existence of a vibrant underground market segment, namely, that of ‘hacking for hire’ services, email hacking in...

View Article

Image may be NSFW.
Clik here to view.

Hacking in Hollywood

It’s generally understood that Hollywood will always put their own spin on actions in order to help tell a story.  That’s part of the movie and TV magic, or artistic license, that directors take when...

View Article
Browsing all 26 articles
Browse latest View live




Latest Images