unknown people on Thursday morning managed to hack The Independent Post website http://www.independentpost.net and in turn made the website inaccessible to its readers.
Meanwhile, an anonymous email to The Independent Post, supposedly from the hackers indicates that the Zambian Watchdog is the next website to be hacked.
Independent Post editor Ruth Zulu confirmed the development saying the attack is expected to have had happened between 01:00 hours and 06:00 hours on Thursday and went on up Friday afternoon.
The time we life in is an time of technology and development. We are interested in the newest gadgets and most of our time we are connected. We are enjoying our freedom to search and connect to whatever we want. This freedom comes with an threat, an threat that will live as long we are using credentials. The threat comes from people that are interested in using your credentials for other causes.
The readiness of the internet community to self organize for mass protests against censorship and online privacy curtailment has taken US legislators aback, believes Trevor Timm, web freedom activist from the Electronic Frontier foundation.
Since the Stop Online Piracy Act (SOPA) was halted in January, the wave of outrage has not ceased as the Congress gets ready to ratify another already-notorious bill.
Israel's growing military and intelligence cooperation with Iran's Northern neighboring state of Azerbaijan and the increasing number of the Israeli drones in the Caucasian country have raised serious questions about the ultimate goals and objectives behind the move.(FNA)
Azerbaijan has recently purchased military equipment from Israel for an amount of $1.6 billion. Details of this purchase were never mentioned, but now the veil of secrecy is being lifted.
The IP address of a computer used to view a motorbike sales ad posted by an early victim of the Toulouse gunman played a vital role in narrowing down Mohamed Merah as the main suspect in a series of attacks that have horrified France, it has emerged, The Register reports.
French soldier Imad Ibn-Ziaten posted a video of the motorbike he wanted to sell online. The paratrooper was killed on March 11 after he invited someone who posed as a prospective buyer to his house.
According to Le Monde, the ad was viewed by about 500 people.
After embarrassing the Andhra Pradesh Government on the eve of its Budget presentation for 2012-13, hackers have launched series of attacks on Monday afternoon. Mr Ponnala Lakshmaiah, State IT Minister, has confirmed that Indonesia, Algeria and Turkey have made several attempts to intrude into a host of Government websites this afternoon as it begins to restore them after the devastating attack last week.
“This time around they are not successful as internal security audit was done on the sites before making them operational,” Mr Lakshmaiah said this evening.
The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element,a standard tool in a penetration testers arsenal.
The attacks built into the toolkit are designed to be targeted and focused attacks against a person or organization used during a penetration test.
Srivats Sampath, CEO, McAfee Said in an Interview with Madanmohan Rao.
Most people who have ever booted up a personal computer (PC) will have noticed the presence of McAfee security software.
Since December 1998, Srivats Sampath has been the president and chief executive officer (CEO) of McAfee, the world's leading security application service provider (ASP). His fifteen years of experience in the information technology sector includes head of marketing at Network Associates and Netscape Communications, and other positions at Central Point Software and Intel.
The Anonymous hacktivist movement is planning to launch a distributed denial of service attack (DDoS) on the Internet’s root DNS servers, using a Reflective DNS Amplification DDoS tool.
According to a note left by members of the Anonymous hacktivist movement on Pastebin.com, the group is planning to launch a distributed denial of service attack (DDoS) on the Internet’s root DNS servers, using a Reflective DNS Amplification DDoS tool specifically created for ‘Operation Global Blackout’.
Paul Sparrows has published a massive cyber attacks timeline. He has taken the time to put them in a nice table. The master index collects all the Cyber Attacks Timeline blog posts for 2011 on a single table, which contains a brief description, an infographic of the timeline and the link to the original article containing references and Hyperlinks.