1,105 results on '"hackers"'
Search Results
2. The types of hackers and cyberattacks in the aviation industry.
- Author
-
Florido-Benítez, Lázaro
- Abstract
The main goal of this study is to analyse the types of hackers and cyberattacks in the aviation industry, to enhance cybersecurity in the air sector. This manuscript has identified 12 different typologies of hackers in the aviation context. First, those hackers who exercise responsibility in proper, effective, ethical, and good practices to improve the safety of citizens and organizations, such as white unicorns, red, blue, green, and nation sponsored hackers. And second, those hackers that are developing and using cyberattacks with bad practices to provoke serious material damage to public and private organizations, consumers, or even terrorist acts to kill people, including black, nation-state, cyberterrorist, whistle-blower, hacktivist, script kiddie, and gray hackers. Furthermore, findings reveal 54 cyberattacks documented in the period analysed (2000 – January 2024). Of the total cyberattacks in the period analysed, 35 were perpetrated at airports (65%) and 19 by airlines (35%). This study also suggests some lines of action to ensure and guarantee the security of data and private information for business-to-consumer (B2C) and business-to-business (B2B) and their transactions in the aviation industry. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Between cyber retaliation and escalation: Explaining the variations in state compliance with the principle of proportionality.
- Author
-
Katagiri, Nori
- Subjects
- *
INTERNET governance , *JUST war doctrine , *CYBERSPACE , *INTERNATIONAL relations , *INTERNATIONAL law , *CYBERTERRORISM , *WAR (International law) - Abstract
I examine how the proportionality principle shapes state responses to a cyberattack. I do so by investigating variation in the effects of the principle of proportionality on the state response. The variation accounts for four types of state response. First, if states respond to a first strike in a proportionate manner, they are in compliance with the principle, and attackers are likely to take it as an indication of willingness to honor the principle. Second, states may react to attackers with an excessive response in violation of the principle, which would force attackers to react as or more harshly. Third, states may accidentally make a proportionate response when they in fact seek to impose excessive harm on attackers. Finally, states may generate an excessive response by error when they in fact seek to comply with the principle. Related Articles: Glen, Carol. 2021. "Norm Entrepreneurship in Global Cybersecurity." Politics & Policy 49(5): 1121–45. https://doi.org/10.1111/polp.12430. Glen, Carol M. 2014. "Internet Governance: Territorializing Cyberspace?" Politics & Policy 42(5): 635–57. http://onlinelibrary.wiley.com/doi/10.1111/polp.12093/full. Zeng, Jinghan, Tim Stevens, and Yaru Chen. 2017. "China's Solution to Global Cyber Governance: Unpacking the Domestic Discourse of 'Internet Sovereignty.'" Politics & Policy 45(3): 432–64. https://doi.org/10.1111/polp.12202. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Pirates of the cyber seas: Are state-sponsored hackers modern-day privateers?
- Author
-
Dwan, Josephine Helen, Paige, Tamsin Phillipa, and McLaughlin, Rob
- Published
- 2022
5. Pirates of the cyber seas: Are state-sponsored hackers modern-day privateers?
- Author
-
Paige, Tamsin Phillipa, Dwan, Josephine Helen, and McLaughlin, Rob
- Published
- 2022
6. Becoming an ethical hacker.
- Author
-
Rivlin, Gary
- Subjects
Computer security ,Hackers ,Penetration testing (Computer security) - Abstract
Summary: "It's impossible to ignore the critical role cybersecurity plays within our society, politics, and the global order. In Becoming an Ethical Hacker, investigative reporter Gary Rivlin offers an easy-to-digest primer on what white hat hacking is, how it began, and where it's going, while providing vivid case studies illustrating how to become one of these "white hats" who specializes in ensuring the security of an organization's information systems. He shows how companies pay these specialists to break into their protected systems and networks to test and assess their security. Readers will learn how these white hats use their skills to improve security by exposing vulnerabilities before malicious hackers can detect and exploit them. Weaving practical how-to advice with inspiring case studies, Rivlin provides concrete, practical steps anyone can take to pursue a career in the growing field of cybersecurity."-- Amazon.
- Published
- 2019
7. Social engineering : the science of human hacking.
- Author
-
Hadnagy, Christopher and Wozniak, Steve
- Subjects
Computer security ,Hackers ,Human-computer interaction ,Social engineering - Abstract
Summary: Examines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats.
- Published
- 2018
8. Code Work: Hacking across the US/México Techno-Borderlands
- Author
-
Beltrán, Héctor, author, Rivero, Daniela, contributor, and Beltrán, Héctor
- Published
- 2023
- Full Text
- View/download PDF
9. The art of invisibility: the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data.
- Author
-
Mitnick, Kevin, Porter, Ray, and Vamosi, Robert
- Subjects
Computer hacker ,Hackers ,Hacking - Abstract
Summary: Learn easy cloaking and counter-measures in the age of big brother and big data from one of the world's most famous hackers.
- Published
- 2012
10. Social engineering : the art of human hacking.
- Author
-
Hadnagy, Christopher
- Subjects
Computer security ,Hackers ,Human-computer interaction ,Social engineering ,Computer hackers - Abstract
Summary: Examines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats.
- Published
- 2011
11. Black box universe: the mind-game phenomenon, the hacker film, and the new millennium.
- Author
-
Collier, Madeleine
- Subjects
GLOBALIZATION ,DOCUMENTARY film production ,FILM studies ,NONFICTION ,FICTION - Abstract
It is the beginning of the new millennium. Globalization is picking up the pace, and Marxist media theorists warn about affective and 'immaterial' modes of extraction, as well as the rise of the attention economy. It is within this web of post-Fordist anxieties and chameleonic, flexible mechanisms of control that Thomas Elsaesser first charts the rise of the mind-game phenomenon, in his 2009 article 'The Mind-Game Film'. Elsaesser and his successors perceptively trace the mind-game film back to a range of global conditions and technological innovations which marked the passage from the twentieth to twenty-first centuries, from interactive VCR and DVD technology to confrontations with post-colonial Others. However, little-to-no mind-game scholarship thus far has centered the rise of Web 2.0 and the concurrent privatization of the Internet; furthermore, with the obvious exception of the Matrix trilogy, the mind-bending hacker films of the 1980s and 1990s (e.g. WarGames, Sneakers, The Net) have been largely overlooked as mind-game and mind-game-adjacent films. Accordingly, this paper examines whether and how the hacker film might be folded into the broader field of mind-game scholarship. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
12. Pioneering neurohackers: between egocentric human enhancement and altruistic sacrifice
- Author
-
Günter Seyfried, Sandra Youssef, and Markus Schmidt
- Subjects
neurotechnology ,hackers ,human enhancement ,ethics ,technology assessment ,do-it-yourself ,Neurosciences. Biological psychiatry. Neuropsychiatry ,RC321-571 - Abstract
The growing field of neurotechnology (NT) is becoming more and more accessible in terms of reduced costs, increasing availability and reliability of materials, and ways to implant devices. As in other engineering fields such as bio-or information technology, there is a growing community of pioneering hackers who (self-)experiment with NT and develop novel applications. While most debates about NT, its goals and ethical ramifications are usually conducted by professionals in the field (neuroscientists, −engineers, −ethicists), little is known within these institutional frameworks about the motivations, goals and visions of neurohackers and how they view ethical ramifications of NT therapeutics vs. human enhancement. In this study we draw on qualitative interviews with 13 of these neurohacking pioneers, who are interacting with NT from a grassroots perspective (i.e., a bottom-up and community/subculture-oriented approach), and shed light on: how they understand themselves in the context of human enhancement; what the role of invasive NTs is when it comes to identifying as a cyborg; if their practices show a clear distinction between therapy and enhancement; whether human enhancement is always about performance, optimization and functionality; and to which extent neurohackers contribute to “mainstreaming” NT.
- Published
- 2023
- Full Text
- View/download PDF
13. Easy to Remember, Hard to Guess: A Password Generation Tool for the Digital Age.
- Author
-
BRĂSLAȘU, Ioana-Ilona, ANDRONESCU, Andrei-Daniel, and NĂSTAC, Dumitru-Iulian
- Subjects
CYBERCRIMINALS ,PYTHON programming language ,DIGITAL technology ,COMPUTER programming ,WEBSITES - Abstract
A brute force attack is a common method used by cybercriminals to gain unauthorized access to user accounts. It is essential for individuals and organizations to take proactive measures to protect themselves from such attacks. One way to do this is by improving their knowledge of cybersecurity and implementing measures to safeguard their online presence. Using programming languages like Python and web-frameworks like Django, websites can be developed to help individuals generate secure and memorable passwords that align with the latest password security standards. This can help anyone who wants to improve their password security, irrespective of whether they have been a victim of a cyber-attack or not. [ABSTRACT FROM AUTHOR]
- Published
- 2023
14. Actual and future digital threats and their impact on civil and military cybersecurity management
- Author
-
Oriana Helena Negulescu, Elena Doval, and Ana Roxana Stefanescu
- Subjects
hackers ,cyber-attacks ,digital threats ,cyber vulnerabilities and damages ,cybersecurity risk management ,Military Science - Abstract
Objectives (1) What is the hacker community made up of and what are the main vulnerable industries? (2) What are the main types of digital threats and how are they characterized? (3) What are the vulnerabilities and damage caused by cyber-attacks? (4) What are the ways to detect digital threats? (5) What measures can be taken to prevent and avoid these attacks? (6) What does the cyber security management process consist of? (7) What cybersecurity evidence and trends can be selected? Methods document analysis; data selection and assambly; synthesis; conceptualization; interpretation. Results The research results are: a presentation of the hacker community and the main vulnerable industries; a brief definition of the types of digital threats; presentation of various vulnerabilities and damages caused by cyber-attacks; a selection of the ways to detect digital threats; a selection of the main measures to prevent and avoid these attacks; cybersecurity management process and a selection of evidence and trends regarding cyber security. Also, two conceptualizations are proposed: the approach to cyber risk management and 10 basic actions to prevent and avoid cyber risks. Conclusions The current and future situation is not encouraging for the management of organizations in terms of the risks caused by cyber-attacks, which are increasing significantly. The solution to prevent and avoid these threats is for civil and military organizations to implement Cybersecurity risk management.
- Published
- 2022
- Full Text
- View/download PDF
15. The Illicit Ecosystem of Hacking: A Longitudinal Network Analysis of Website Defacement Groups.
- Author
-
Perkins, Robert C., Ouellet, Marie, Howell, Christian J., and Maimon, David
- Subjects
- *
COMPUTER hacking , *CRIMINAL behavior , *CRIMINAL investigation , *SOCIAL networks , *ECOSYSTEMS - Abstract
Over the past four decades, research on hackers has widely propagated within the social sciences. Although this area of scholarship yields rich insight into the interpersonal dynamics of hackers, research on the unique ecosystems they create and inhabit is scant in comparison. The current study aims to offer a more complete assessment of hackers' ecosystems by incorporating the group affiliations which link hackers to one another. Using 12 months of archived website defacement data containing individuals' self-reported group affiliations alongside their hacking activities, the study reconstructs the social network of hacker groups over time. Findings reveal the illicit ecosystem to be loosely connected, yet densely clustered around a few central groups. The ecosystem also maintained its network features across the observation period with no sign of structural degradation. These findings corroborate extant research on the social environments of hackers, offer an innovative look into the illicit ecosystem of website defacers, and serve as a steppingstone to extend investigations of criminal behavior to the group-level. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
16. Black Hat Bash : Creative Scripting for Hackers and Pentesters
- Author
-
Nick Aleks, Dolev Farhi, Nick Aleks, and Dolev Farhi
- Subjects
- Hackers, Penetration testing (Computer security), Bash (Computer program language)
- Abstract
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!In the hands of the penetration tester, bash scripting becomes a powerful offensive security tool. In Black Hat Bash, you'll learn how to use bash to automate tasks, develop custom tools, uncover vulnerabilities, and execute advanced, living-off-the-land attacks against Linux servers. You'll build a toolbox of bash scripts that will save you hours of manual work. And your only prerequisite is basic familiarity with the Linux operating system.You'll learn the basics of bash syntax, then set up a Kali Linux lab to apply your skills across each stage of a penetration test—from initial access to data exfiltration. Along the way, you'll learn how to perform OS command injection, access remote machines, gather information stealthily, and navigate restricted networks to find the crown jewels. Hands-on exercises throughout will have you applying your newfound skills.Key topics covered include:Bash scripting essentials: From control structures, functions, loops, and text manipulation with grep, awk, and sed.How to set up your lab: Create a hacking environment with Kali and Docker and install additional tools.Reconnaissance and vulnerability scanning: Learn how to perform host discovery, fuzzing, and port scanning using tools like Wfuzz, Nmap, and Nuclei.Exploitation and privilege escalation: Establish web and reverse shells, and maintain continuous access.Defense evasion and lateral movement: Audit hosts for landmines, avoid detection, and move through networks to uncover additional targets.Whether you're a pentester, a bug bounty hunter, or a student entering the cybersecurity field, Black Hat Bash will teach you how to automate, customize, and optimize your offensive security strategies quickly and efficiently, with no true sorcery required.
- Published
- 2025
17. Hands-On Ethical Hacking Tactics : Strategies, Tools, and Techniques for Effective Cyber Defense
- Author
-
Shane Hartman and Shane Hartman
- Subjects
- Hackers, Penetration testing (Computer security)
- Abstract
Detect and mitigate diverse cyber threats with actionable insights into attacker types, techniques, and efficient cyber threat huntingKey FeaturesExplore essential tools and techniques to ethically penetrate and safeguard digital environmentsSet up a malware lab and learn how to detect malicious code running on the networkUnderstand different attacker types, their profiles, and mindset, to enhance your cyber defense planPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIf you're an ethical hacker looking to boost your digital defenses and stay up to date with the evolving cybersecurity landscape, then this book is for you. Hands-On Ethical Hacking Tactics is a comprehensive guide that will take you from fundamental to advanced levels of ethical hacking, offering insights into both offensive and defensive techniques. Written by a seasoned professional with 20+ years of experience, this book covers attack tools, methodologies, and procedures, helping you enhance your skills in securing and defending networks. The book starts with foundational concepts such as footprinting, reconnaissance, scanning, enumeration, vulnerability assessment, and threat modeling. Next, you'll progress to using specific tools and procedures for hacking Windows, Unix, web servers, applications, and databases. The book also gets you up to speed with malware analysis. Throughout the book, you'll experience a smooth transition from theoretical concepts to hands-on techniques using various platforms. Finally, you'll explore incident response, threat hunting, social engineering, IoT hacking, and cloud exploitation, which will help you address the complex aspects of ethical hacking. By the end of this book, you'll have gained the skills you need to navigate the ever-changing world of cybersecurity.What you will learnUnderstand the core concepts and principles of ethical hackingGain hands-on experience through dedicated labsExplore how attackers leverage computer systems in the digital landscapeDiscover essential defensive technologies to detect and mitigate cyber threatsMaster the use of scanning and enumeration toolsUnderstand how to hunt and use search information to identify attacksWho this book is forHands-On Ethical Hacking Tactics is for penetration testers, ethical hackers, and cybersecurity enthusiasts looking to explore attack tools, methodologies, and procedures relevant to today's cybersecurity landscape. This ethical hacking book is suitable for a broad audience with varying levels of expertise in cybersecurity, whether you're a student or a professional looking for job opportunities, or just someone curious about the field.
- Published
- 2024
18. The Ultimate Kali Linux Book : Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-edge Pentesting
- Author
-
Glen D. Singh and Glen D. Singh
- Subjects
- Operating systems (Computers), Hackers, Penetration testing (Computer security)
- Abstract
Excel in penetration testing by delving into the latest ethical hacking tools and techniques from scratch Purchase of the print or Kindle book includes a free eBook in PDF format.Key FeaturesLearn to think like an adversary to strengthen your cyber defencesExecute sophisticated real-life penetration tests, uncovering vulnerabilities in enterprise networks that go beyond the surface levelSecurely manipulate environments using Kali Linux, ensuring you're fully equipped to safeguard your systems against real-world threatsBook DescriptionEmbark on an exciting journey into the world of Kali Linux – the central hub for advanced penetration testing. Honing your pentesting skills and exploiting vulnerabilities or conducting advanced penetration tests on wired and wireless enterprise networks, Kali Linux empowers cybersecurity professionals. In its latest third edition, this book goes further to guide you on how to setup your labs and explains breaches using enterprise networks. This book is designed for newcomers and those curious about penetration testing, this guide is your fast track to learning pentesting with Kali Linux 2024.x. Think of this book as your stepping stone into real-world situations that guides you through lab setups and core penetration testing concepts. As you progress in the book you'll explore the toolkit of vulnerability assessment tools in Kali Linux, where gathering information takes the spotlight. You'll learn how to find target systems, uncover device security issues, exploit network weaknesses, control operations, and even test web applications. The journey ends with understanding complex web application testing techniques, along with industry best practices. As you finish this captivating exploration of the Kali Linux book, you'll be ready to tackle advanced enterprise network testing – with newfound skills and confidence.What you will learnEstablish a firm foundation in ethical hackingInstall and configure Kali Linux 2024.1Build a penetration testing lab environment and perform vulnerability assessmentsUnderstand the various approaches a penetration tester can undertake for an assessmentGathering information from Open Source Intelligence (OSINT) data sourcesUse Nmap to discover security weakness on a target system on a networkImplement advanced wireless pentesting techniquesBecome well-versed with exploiting vulnerable web applicationsWho this book is forThis pentesting book is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux, then this book is for you.
- Published
- 2024
19. Research on Ethical Hacking.
- Author
-
Singh, Yash, Adamya, Harshi, Aryan, Sanidhya, and Sayyad
- Subjects
COMPUTER network security ,COMPUTER hacking ,INTERNET security ,INFORMATION storage & retrieval systems - Abstract
Hacking is defined as the process of exploiting the sensitive and valuable information of any system, group, or any organization which may even lead to leak of any confidential information or data. Deriving from the concept of hacking, ethical hacking is a kind of hacking meant for societal benefit, for helping governmental organizations, or may even help the organizations to test and analyze its security. Which in turn, helps an individual or an organization to counter any security threats or vulnerabilities. Ethical hacking is one of the most important modern-day techniques to keep our privacy in check. The aim of this paper is to find out the process involved in ethical hacking and penetration testing in network security, with a view to exploring whether ethical hacking can be applied to the field of cyber-security. [ABSTRACT FROM AUTHOR]
- Published
- 2023
20. The Impact of Russian Cyber Attackers within the Ukraine Situation.
- Author
-
Warren, M., Štitilis, D., and Laurinaitis, M.
- Subjects
RUSSIA-Ukraine relations ,WORLD War II ,INTERNET security ,COMPUTER hackers ,WAR - Abstract
On 24 February 2022, Russia invaded Ukraine. The Russo-Ukrainian War is the largest war in Europe since World War II. The aim of the paper is to look at how politically motivated hacking by Russia has been used as part of the Ukraine situation with a focus on the different attack types since the Russian invasion of Ukraine in 2022. The paper will focus on the different groups acting on behalf of Russia, their actions, and techniques. The paper will discuss what their actions mean for the future of cyber conflicts [ABSTRACT FROM AUTHOR]
- Published
- 2023
21. Cyber Crime and Cyber Terrorism
- Author
-
Robert W. Taylor, Eric J. Fritsch, John R. Liederbach, Michael R. Saylor, William L. Tafoya, Robert W. Taylor, Eric J. Fritsch, John R. Liederbach, Michael R. Saylor, and William L. Tafoya
- Subjects
- Computer crimes, Cyberterrorism, Hackers, Computer crimes--Investigation--United States, Digital forensic science, Computer crimes--Prevention.--United States
- Abstract
Cyber Crime and Cyber Terrorism provides a beginner's introduction to computer crime. It bridges the gap between criminal justice and the technical side of cybercrime, cyber terrorism and information warfare. Unique in its non-technical coverage of these issues, this text summarizes the types of crimes and terrorist acts committed using computer technology, assesses digital criminals and their motivations, and weighs legal strategies and tactics targeting these types of crime. The 5th Edition has been heavily revised, both in content and organization. New pedagogical features have been added to each chapter, including chapter objectives, summaries, boxes, review questions and critical-thinking exercises.
- Published
- 2023
22. Media portrayal of hackers in China Daily and The New York Times : A corpus-based critical discourse analysis.
- Author
-
Pei, Jiamin, Li, Dandi, and Cheng, Le
- Abstract
This study draws on a synergy of Corpus Linguistics and Critical Discourse Studies to scrutinize the portrayal of hackers in China Daily and The New York Times in the 21st century (2001–2020), primarily revolving around the main social actors and targets in hacking. This study demonstrates that both media share a positive transformation of the image-building of hackers in the 21st century. Besides, countries are salient social actors in hacker media discourse and the two media differ in their ways of constructing them. The New York Times tends to have a negative other-representation and categorical otherness of specific countries through such discursive strategies as negative other-representation and group categorization, whereas China Daily is prone to insist on opposing the US hacking allegations in a defensive manner. Regarding major targets, China Daily highlights government websites whereas The New York Times emphasizes government websites, officials' emails, large technology companies, and election infrastructure. The analysis shows that the two media's different ways of framing hackers are underpinned by the ideologies behind them and the Chinese and US socio-political landscapes. This study can provide insights into how hacker discourse in media is represented in the 21st century and how national identities are constructed in the media representations of hackers. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
23. Hacking For Dummies
- Author
-
Kevin Beaver and Kevin Beaver
- Subjects
- Hackers, Computer networks--Security measures, Computer security
- Abstract
Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more. You'll find out how to: Stay on top of the latest security weaknesses that could affect your business's security setup Use freely available testing tools to “penetration test” your network's security Use ongoing security checkups to continually ensure that your data is safe from hackers Perfect for small business owners, IT and security professionals, and employees who work remotely, Hacking For Dummies is a must-have resource for anyone who wants to keep their data safe.
- Published
- 2022
24. Learn Computer Forensics : Your One-stop Guide to Searching, Analyzing, Acquiring, and Securing Digital Evidence
- Author
-
William Oettinger and William Oettinger
- Subjects
- Electronic evidence, Hackers, Computer security, Computer crimes--Investigation, Criminal investigation
- Abstract
Learn Computer Forensics from a veteran investigator and technical trainer and explore how to properly document digital evidence collectedKey FeaturesInvestigate the core methods of computer forensics to procure and secure advanced digital evidence skillfullyRecord the digital evidence collected and organize a forensic examination on itPerform an assortment of Windows scientific examinations to analyze and overcome complex challengesBook DescriptionComputer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report.This book will help you to build up the skills you need to work in a highly technical environment. This book's ideal goal is to get you up and running with forensics tools and techniques to successfully investigate crime and corporate misconduct. You will discover ways to collect personal information about an individual from online sources. You will also learn how criminal investigations are performed online while preserving data such as e-mails, images, and videos that may be important to a case. You will further explore networking and understand Network Topologies, IP Addressing, and Network Devices. Finally, you will how to write a proper forensic report, the most exciting portion of the forensic exam process.By the end of this book, you will have developed a clear understanding of how to acquire, analyze, and present digital evidence, like a proficient computer forensics investigator.What you will learnExplore the investigative process, rules of evidence, legal process, and ethical guidelinesUnderstand the difference between sectors, clusters, volumes, and file slackValidate forensic equipment, computer program, and examination methodsCreate and validate forensically sterile mediaGain the ability to draw conclusions based on the exam discoveriesRecord discoveries utilizing the technically correct terminologyDiscover the limitations and guidelines for RAM Capture and its toolsExplore timeline analysis, media analysis, string searches, and recovery of deleted dataWho this book is forThis book is for IT beginners, students, or an investigator in the public or private sector. This book will also help IT professionals who are new to incident response and digital forensics and are looking at choosing cybersecurity as their career. Individuals planning to pass the Certified Forensic Computer Examiner (CFCE) certification will also find this book useful.
- Published
- 2022
25. Ethical Hacking: Techniques, Tools, and Countermeasures
- Author
-
Michael G. Solomon, Sean-Philip Oriyano, Michael G. Solomon, and Sean-Philip Oriyano
- Subjects
- Hackers, Penetration testing (Computer security)
- Abstract
Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous real-world examples, the Fourth Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices.
- Published
- 2022
26. Ethical Hacker’s Penetration Testing Guide
- Author
-
Samir Kumar Rakshit and Samir Kumar Rakshit
- Subjects
- Hackers, Penetration testing (Computer security), Computer security
- Published
- 2022
27. Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition
- Author
-
Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost, Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, and Moses Frost
- Subjects
- Computer security--Handbooks, manuals, etc, Penetration testing (Computer security)--Handbooks, manuals, etc, Hackers, Computer security
- Abstract
Up-to-date strategies for thwarting the latest, most insidious network attacks This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks. Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition clearly explains the enemy's devious weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. You will get complete coverage of Internet of Things, mobile, and Cloud security along with penetration testing, malware analysis, and reverse engineering techniques. State-of-the-art malware, ransomware, and system exploits are thoroughly explained. Fully revised content includes 7 new chapters covering the latest threats Includes proof-of-concept code stored on the GitHub repository Authors train attendees at major security conferences, including RSA, Black Hat, Defcon, and Besides
- Published
- 2022
28. The Ultimate Kali Linux Book : Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-ng, and Empire
- Author
-
Glen D. Singh and Glen D. Singh
- Subjects
- Operating systems (Computers), Hackers, Penetration testing (Computer security)
- Abstract
The most comprehensive guide to ethical hacking and penetration testing with Kali Linux, from beginner to professionalKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using advanced real-life hacker techniquesUse Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environmentPurchase of the print or Kindle book includes a free eBook in the PDF formatBook DescriptionKali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks. This book is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you'll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you'll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You'll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you'll be able to compromise Active Directory and exploit enterprise networks. Finally, this book covers best practices for performing complex web penetration testing techniques in a highly secured environment. By the end of this Kali Linux book, you'll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux.What you will learnExplore the fundamentals of ethical hackingUnderstand how to install and configure Kali LinuxPerform asset and network discovery techniquesFocus on how to perform vulnerability assessmentsExploit the trust in Active Directory domain servicesPerform advanced exploitation with Command and Control (C2) techniquesImplement advanced wireless hacking techniquesBecome well-versed with exploiting vulnerable web applicationsWho this book is forThis pentesting book is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux operating system (OS), then this book is for you.
- Published
- 2022
29. Technology and Surveillance in Millennial Hollywood
- Author
-
Street, Joe, author
- Published
- 2023
- Full Text
- View/download PDF
30. Website Defacer Classification: A Finite Mixture Model Approach.
- Author
-
Burruss, George W., Howell, C. Jordan, Maimon, David, and Wang, Fangzhou
- Subjects
- *
FINITE, The , *RECIDIVISTS , *CLASSIFICATION , *SOCIAL media , *COMPUTER hackers - Abstract
Hackers often engage in website defacement early in their criminal careers to establish a reputation. Some hackers become increasingly prolific and launch a large number of attacks against their targets, whereas others only launch a few attacks before eventually desisting from a life of crime. A better understanding of why some hackers launch a large number of attacks, while others do not, will assist in the implementation of targeted intervention strategies. Therefore, the current study, using a sample of 119 active hackers, seeks to answer two research questions: (1) Are there different groups of website defacers based on attack volume? (2) Which observed hacker-level characteristics can be used to predict latent class membership? We find that two unique groups of website defacers exist: low-volume defacers (69%) and high-volume defacers (31%). Social media presence, the content of the defacement, and the type of defacement are all predictive of latent class membership. Policy implications are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
31. Human Hacking : Win Friends, Influence People, and Leave Them Better Off for Having Met You
- Author
-
Christopher Hadnagy, Seth Schulman, Christopher Hadnagy, and Seth Schulman
- Subjects
- Social engineering, Hackers, Interpersonal communication
- Abstract
A global security expert draws on psychological insights to help you master the art of social engineering—human hacking. Make friends, influence people, and leave them feeling better for having met you by being more empathetic, generous, and kind.Eroding social conventions, technology, and rapid economic change are making human beings more stressed and socially awkward and isolated than ever. We live in our own bubbles, reluctant to connect, and feeling increasingly powerless, insecure, and apprehensive when communicating with others.A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good—to help you regain your confidence and control. Human Hacking provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other's decisions, and protect yourself from manipulators. Ultimately, you'll become far more self-aware about how you're presenting yourself—and able to use it to improve your life. Hadnagy includes lessons and interactive “missions”—exercises spread throughout the book to help you learn the skills, practice them, and master them. With Human Hacking, you'll soon be winning friends, influencing people, and achieving your goals.
- Published
- 2021
32. Summary of Christopher Hadnagy's Human Hacking
- Author
-
IRB Media and IRB Media
- Subjects
- Interpersonal communication, Nonverbal communication, Social engineering, Hackers
- Abstract
Get the Summary of Christopher Hadnagy's Human Hacking in 20 minutes. Please note: This is a summary & not the original book. Original book introduction: A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good—to help you regain your confidence and control. Human Hacking provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other's decisions, and protect yourself from manipulators. Ultimately, you'll become far more self-aware about how you're presenting yourself—and able to use it to improve your life.
- Published
- 2021
33. Hacking Multifactor Authentication
- Author
-
Roger A. Grimes and Roger A. Grimes
- Subjects
- Computers--Access control--Testing, Computer networks--Security measures, Computer security, Hacking, Hackers, Cryptography
- Abstract
Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That's right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. This book covers over two dozen ways that various MFA solutions can be hacked, including the methods (and defenses) common to all MFA solutions. You'll learn about the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. Finally, this book reveals a simple method for quickly evaluating your existing MFA solutions. If using or developing a secure MFA solution is important to you, you need this book. Learn how different types of multifactor authentication work behind the scenes See how easy it is to hack MFA security solutions—no matter how secure they seem Identify the strengths and weaknesses in your (or your customers') existing MFA security and how to mitigate Author Roger Grimes is an internationally known security expert whose work on hacking MFA has generated significant buzz in the security world. Read this book to learn what decisions and preparations your organization needs to take to prevent losses from MFA hacking.
- Published
- 2021
34. Trojan Horse
- Author
-
Jim Corrigan and Jim Corrigan
- Subjects
- Fiction, Juvenile works, Special forces (Military science)--Juvenile fict, Special operations (Military science)--Juvenile, Cyberterrorism--Juvenile fiction, Hackers--Juvenile fiction, Terrorists--Juvenile fiction, Cyberterrorism, Hackers
- Abstract
The US military is under cyberattack. Computer failures have crippled every weapons system. Gizmo and Invisible Six must discover who is behind this attack and the culprits'aim. But the mysterious hackers seem one step ahead of I-6 at every turn, and their use of autonomous weapons keeps I-6 from getting close. Can Gizmo and I-6 stop the worst cyberattack in US military history? Aligned to Common Core Standards and correlated to state standards. Claw is an imprint of Magic Wagon, a division of ABDO.
- Published
- 2021
35. Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence.
- Author
-
Samtani, Sagar, Chinn, Ryan, Chen, Hsinchun, and Nunamaker, Jay F.
- Subjects
CYBERTERRORISM ,COMPUTER hacking ,COMPUTER hackers ,COMPUTER crimes ,ONLINE social networks ,TEXT mining ,DATA mining - Abstract
Cyber attacks cost the global economy approximately $445 billion per year. To mitigate attacks, many companies rely on cyber threat intelligence (CTI), or threat intelligence related to computers, networks, and information technology (IT). However, CTI traditionally analyzes attacks after they have already happened, resulting in reactive advice. While useful, researchers and practitioners have been seeking to develop proactive CTI by better understanding the threats present in hacker communities. This study contributes a novel CTI framework by leveraging an automated and principled web, data, and text mining approach to collect and analyze vast amounts of malicious hacker tools directly from large, international underground hacker communities. By using this framework, we identified many freely available malicious assets such as crypters, keyloggers, web, and database exploits. Some of these tools may have been the cause of recent breaches against organizations such as the Office of Personnel Management (OPM). The study contributes to our understanding and practice of the timely proactive identification of cyber threats. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
36. Deviant Subcultures in European Context
- Author
-
Stupperich, Alexandra, Ihm, Helga, and Harper, Shannon B.
- Published
- 2021
- Full Text
- View/download PDF
37. Model Trains and Networks of Privilege
- Author
-
Trammell, Aaron, author
- Published
- 2023
- Full Text
- View/download PDF
38. Hacker Techniques, Tools, and Incident Handling
- Author
-
Sean-Philip Oriyano, Michael G. Solomon, Sean-Philip Oriyano, and Michael G. Solomon
- Subjects
- Hackers, Computer security, Penetration testing (Computer security), Computer networks--Security measures
- Abstract
Hacker Techniques, Tools, and Incident Handling, Third Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by subject matter experts, with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Third Edition provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.
- Published
- 2020
39. Learn Computer Forensics : A Beginner's Guide to Searching, Analyzing, and Securing Digital Evidence
- Author
-
William Oettinger and William Oettinger
- Subjects
- Electronic evidence, Hackers, Computer security, Computer crimes--Investigation, Criminal investigation
- Abstract
Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedingsKey FeaturesLearn the core techniques of computer forensics to acquire and secure digital evidence skillfullyConduct a digital forensic examination and document the digital evidence collectedPerform a variety of Windows forensic investigations to analyze and overcome complex challengesBook DescriptionA computer forensics investigator must possess a variety of skills, including the ability to answer legal questions, gather and document evidence, and prepare for an investigation. This book will help you get up and running with using digital forensic tools and techniques to investigate cybercrimes successfully. Starting with an overview of forensics and all the open source and commercial tools needed to get the job done, you'll learn core forensic practices for searching databases and analyzing data over networks, personal devices, and web applications. You'll then learn how to acquire valuable information from different places, such as filesystems, e-mails, browser histories, and search queries, and capture data remotely. As you advance, this book will guide you through implementing forensic techniques on multiple platforms, such as Windows, Linux, and macOS, to demonstrate how to recover valuable information as evidence. Finally, you'll get to grips with presenting your findings efficiently in judicial or administrative proceedings. By the end of this book, you'll have developed a clear understanding of how to acquire, analyze, and present digital evidence like a proficient computer forensics investigator.What you will learnUnderstand investigative processes, the rules of evidence, and ethical guidelinesRecognize and document different types of computer hardwareUnderstand the boot process covering BIOS, UEFI, and the boot sequenceValidate forensic hardware and softwareDiscover the locations of common Windows artifactsDocument your findings using technically correct terminologyWho this book is forIf you're an IT beginner, student, or an investigator in the public or private sector this book is for you. This book will also help professionals and investigators who are new to incident response and digital forensics and interested in making a career in the cybersecurity domain. Individuals planning to pass the Certified Forensic Computer Examiner (CFCE) certification will also find this book useful.
- Published
- 2020
40. ChevroCrypto – Cryptography API.
- Author
-
Alves, Filipe, Mateus-Coelho, Nuno, and Cruz-Cunha, Manuela
- Subjects
DATA protection ,INTERNET of things ,EVERYDAY life - Abstract
The world of IoT systems is increasingly inserted into people's daily lives, whether in people in general who systematically use these technologies in their daily lives and companies. With the growth of this technology, it also carries concerns regarding its security where the number of attacks by hackers has increased. The IoT technologies are increasingly inserted in the various challenges that arise, and it is increasingly important to ensure the protection of data from these systems, there are several tools available to help programmers to protect the data, but for this, it is necessary to understand the rules internationally mandatory, and a whole set and important characteristics that should be taken into account when carrying out projects, this project sees as the help of programmers, those who eventually have less experience, those who have no knowledge of the area and that their system should have considerable security. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
41. A Machine Learning Approach for Identifying and Detecting Hazards.
- Author
-
Srinivas, B., Jena, Gunamani, Charukesh, Anguluri, Lakshmi, Annamdevula Sai Anantha, Prasad, Dangeti Satyanarayana, and Lakshmi, Maddisetti D. Naga
- Subjects
- *
INDUSTRIAL management , *SURFING , *MACHINE learning , *WEBSITES , *FEATURE extraction - Abstract
Every day, we log on to the internet and use it to conduct our business. As a result, browser vendors compete for users' attention by adding new features and enhancing existing ones, which exposes websites to hackers' attacks. Surfers, on the other hand, are looking for a rapid and precise model that can tell the difference between safe and harmful websites. In this study, we develop a new classification approach to evaluate and detect dangerous online sites using Machine Learning classifiers such as Random Forest, Support Vector Machine, Naive Bayes, Logistic Regression, and a specific URL (Uniform Resource Locator). Experimental data shows that the random forest classifier is more accurate than other machine learning classifiers, with an accuracy rate of 95%. [ABSTRACT FROM AUTHOR]
- Published
- 2022
42. A vítima nos processos de cibercrime
- Author
-
Sandra Faria
- Subjects
cyber crime ,online ,hackers ,computadores ,internet ,Medicine - Published
- 2022
- Full Text
- View/download PDF
43. Improved Database Security Using Cryptography with Genetic Operators
- Author
-
Devara, Sandeep Reddy and Azad, Chandrasekhar
- Published
- 2023
- Full Text
- View/download PDF
44. Kingdom of Lies : Adventures in Cybercrime
- Author
-
Kate Fazzini and Kate Fazzini
- Subjects
- Hackers, Computer crimes
- Abstract
Would you say your phone is safe, or your computer? What about your car? Or your bank? There is a global war going on and the next target could be anyone – an international corporation or a randomly selected individual. From cybercrime villages in Romania to intellectual property theft campaigns in China, these are the true stories of the hackers behind some of the largest cyberattacks in history and those committed to stopping them. You've never heard of them and you're not getting their real names. Kate Fazzini has met the hackers who create new cyberweapons, hack sports cars and develop ransomware capable of stopping international banks in their tracks. Kingdom of Lies is a fast-paced look at technological innovations that were mere fantasy only a few years ago, but now make up an integral part of all our lives.
- Published
- 2019
45. The Gomorrah Gambit
- Author
-
Tom Chatfield and Tom Chatfield
- Subjects
- Fiction, Thrillers (Fiction), Suspense fiction, Hackers--Fiction, Dark Web--Fiction, Conspiracies--Fiction, Conspiracies, Dark Web, Hackers
- Abstract
With dark technology hollowing out global privacy, an elite hacker enters the belly of the beast in this'gripping, intelligent, and stylist'international conspiracy thriller (Sophie Hannah, author of Closed Casket).Azi Bello is an amiable outsider with a genius for hacking. Having spent the better part of his life holed up in a shed in his backyard, Azi has become increasingly enmeshed in the dark side of the internet. With the divide between online and offline worlds vanishing, so too is the line between those transforming civilization through technology and those trying to bring it to its knees. Dark networks rule. Someone with the right connections can access to anything imaginable, and power is theirs for the taking-although even they can't know what kind of bargain they've struck. Tipped off by a secretive young woman named Munira, Azi sets out to unravel the mysterious online marketplace known as Gomorrah, sacrificing his carefully constructed privacy in the process. Munira's life is spiraling out of control: her cousins recruited to work for a terrorist state that's hunting them both, her destiny in Azi's hands. Her desperation drags Azi into the field where, working together, the two uncover an unimaginable conspiracy.As pressure mounts, Azi has no choice but to take on the ultimate infiltration. In an age when identities can be switched at will and nobody is who they seem, how far will he go to end the nightmare?
- Published
- 2019
46. Kingdom of Lies : Unnerving Adventures in the World of Cybercrime
- Author
-
Kate Fazzini and Kate Fazzini
- Subjects
- Computer crimes, Hackers
- Abstract
“Wow. Kate Fazzini is the rare top-level reporter who can make you see, smell and feel a hidden world, not just understand it. Cybercrime (and security) has found its Michael Lewis.” —Bret Witter, co-author of the #1 NYT bestseller The Monuments MenOne of BookRiot's'50 of the Best Books to Read This Summer'In the tradition of Michael Lewis and Tom Wolfe, a fascinating and frightening behind-the-scenes look at the interconnected cultures of hackers, security specialists, and law enforcementA 19-year-old Romanian student stumbles into a criminal ransomware ring in her village. Soon she is extorting Silicon Valley billionaires for millions--without knowing the first thing about computers.A veteran cybersecurity specialist has built a deep network of top notch hackers in one of the world's largest banks. But then the bank brings in a cadre of ex-military personnel to “help.” A cynical Russian only leaves his tiny New Jersey apartment to hack sports cars at a high performance shop in Newark. But he opens his door to a consultant who needs his help. A hotel doorman in China once served in the People's Army, stealing intellectual property from American companies. Now he uses his skills to build up a private side-business selling the data he takes from travelers to Shanghai's commercial center. Kingdom of Lies follows the intertwined stories of cybercriminals and ethical hackers as they jump from criminal trend to criminal trend, crisis to crisis. A cybersecurity professional turned journalist, Kate Fazzini illuminates the many lies companies and governments tell us about our security, the lies criminals tell to get ahead, and the lies security leaders tell to make us think they are better at their jobs than they are.Like Traffic set in the cybercrime world, Kingdom of Lies is as entertaining as it is eye opening.
- Published
- 2019
47. Cult of the Dead Cow : How the Original Hacking Supergroup Might Just Save the World
- Author
-
Joseph Menn and Joseph Menn
- Subjects
- Cult of the Dead Cow, Hacktivism, Hackers, Computer security, SOCIAL SCIENCE / Sociology / General
- Abstract
The shocking untold story of the elite secret society of hackers fighting to protect our freedom – “a hugely important piece of the puzzle for anyone who wants to understand the forces shaping the internet age.'(New York Times Book Review)Cult of the Dead Cow is the tale of the oldest active, most respected, and most famous American hacking group of all time. With its origins in the earliest days of the internet, the cDc is full of oddball characters – activists, artists, and musicians – some of whom went on to advise presidents, cabinet members, and CEOs, and who now walk the corridors of power in Washington and Silicon Valley. Today, the group and its followers are battling electoral misinformation, making personal data safer, and organizing to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow describes how, at a time when governments, corporations, and criminals hold immense power, a small band of tech iconoclasts is on our side fighting back.
- Published
- 2019
48. Why Hackers Win : Power and Disruption in the Network Society
- Author
-
Patrick Burkart, Tom McCourt, Patrick Burkart, and Tom McCourt
- Subjects
- Hacking--Political aspects, Hackers
- Abstract
When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the “trusted systems” underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking.
- Published
- 2019
49. Hybrid professionalism in journalism: Opportunities and risks of hacker sources
- Author
-
Philip Di Salvo and Colin Porlezza
- Subjects
boundary work ,hackers ,hybridity ,journalism ethics ,news sources ,field theory ,hacking ,Communication. Mass media ,P87-96 ,Social Sciences - Abstract
Hackers have a double relevance with regard to the transformation of the journalistic field: first, they have established themselves as journalistic actors, even if their work may sometimes seem unfamiliar. Second, hackers have not only become important sources for information but they are also a topic of public interest in a data-driven society increasingly threatened by surveillance capitalism. This paper critically discusses the role of hackers as news sources by analyzing the “stalkerware” investigation carried out by the online news magazine Motherboard. Drawing from field theory and boundary work, the article sheds light on how hackers exert an increasing influence on journalism, its practices, epistemologies, and ethics, resulting in an increasing hybridization of journalism. Journalism has become a dynamic space, in which hackers are not only becoming relevant actors in the journalism field, but they often represent the only sources journalists have to shed light on wrongdoings. Hence, hackers are increasingly defining the conditions under which journalism is carried out, both in terms of its practices as well as in its normative framework.
- Published
- 2020
- Full Text
- View/download PDF
50. Desafíos nacionales frente a la ciberseguridad en el escenario global: un análisis para Colombia
- Author
-
Milton Ospina Díaz and Pedro Emilio Sanabria Rangel
- Subjects
delito informático ,criminología ,criminalidad ,criminalidad mediante computadoras ,(fuente: tesauro de política criminal latinoamericana - ilanud) ,guerra cibernética ,piratería informática ,hackers ,organizaciones públicas (autor) ,Criminal law and procedure ,K5000-5582 ,Social pathology. Social and public welfare. Criminology ,HV1-9960 - Abstract
En este artículo se aborda el tema de la seguridad de la información frente a amenazas cibernéticas en un contexto global, haciendo una revisión de la situación actual en Colombia. Mediante una investigación cualitativa, teórica, documental y descriptiva, se hace un recorrido histórico sobre la ciberseguridad (ciberguerra, ciberdefensa, delitos informáticos), particularmente en el componente de seguridad de la información, y se trabajan diversos aspectos al respecto (contextos, análisis de riesgos, sistemas de gestión y estándares de calidad) mientras se muestran los riesgos para las empresas, la sociedad y los países, evidenciados con la pandemia del coronavirus (COVID-19). Para el caso colombiano se revisaron datos sobre las acciones gubernamentales ante estas amenazas y se indagó sobre sus políticas de seguridad informática y estándares de calidad. Al final del artículo se muestran los retos que tiene Colombia frente a las amenazas cibernéticas, en cuanto a la seguridad de la información.
- Published
- 2020
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.