How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘ISIL’
Most Recent
Read More
September 26, 2016

Pro-ISIS Hacker Gets 20 Years For Leaking Details Of Over 1,000 US Military Personnel

According to a press release from the US Attorneys Office in the Eastern District of Virginia, a malevolent hacker associated with the Islamic State (also called ISIL or ISIS) has received 20 years in US prison for activities conducted last summer.

Read More
November 26, 2015

Feds Arrest Ohio Man Over GIF

Whether you call it a “jiff” or a “giff,” a .GIF file can get you arrested these days, even if it doesn’t contain banned pornography.

Thursday, the Justice Department released a statement about its recent move to arrest Terrence McNeil of Akron, Ohio, in relation to posts on his Tumblr account. Specifically, the charges state that McNeil solicited the murder of US soldiers by displaying a Gif on his blog that listed the names, addresses, and branches of US military members which ISIL seeks to execute.

A day after the US holiday Veteran’s Day, which honors the sacrifice of military members, U.S. Attorney Steven M. Dettelbach told said:

As this nation [...]

Read More
November 16, 2015

Paris Attacks Planned Via Playstation 4

When Edward Snowden leaked his massive trove of stolen NSA documents to Glenn Greenwald and Laura Poitras, one of the startling revelations was that the NSA had even decided to snoop into gaming networks such as Xbox Live and PlayStation Network. These are perceived as the domain of children, many thought, and thus shame on the NSA for not even leaving kids out of all this.

But according to Belgian officials, who confiscated a console in Brussels over the weekend which they believe to have been involved in the attacks on Paris, the NSA’s program wasn’t so far off the mark. As it turns out, the very proprietary nature of the PSN makes it difficult for spies to [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University