The Latest in IT Security

Posts Tagged ‘pseudonyms’

Following my previous blog on Francopol 2011, here are some data and slides from my own talk on the Anonymous Group.Anonymous circles are not the only component of hacktivism, merely a loose collection with the highest media profile. Other representatives of this informal protest movement include the “Indignants,” who use social networks around the world […]

Read more ...

The FBI believes that the homeless man they arrested on Thursday was “Commander X”, a member of the People’s Liberation Front (PLF) associated with Anonymous hacktivism. 47-year-old Christopher Doyon has entered a not guilty plea to charges of “conspiracy to cause intentional damage to a protected computer, causing intentional damage to a protected computer, and […]

Read more ...

28
Jun
2011

Next week we’ll publish PandaLabs Report for the 2nd Quarter. This time we have made a few changes. Our team (special kudos to Txema Quintana) has changed (to better) the design of the report, making it easier to read. But this won’t be the only change. Delivering the news in an impersonal manner is OK, […]

Read more ...


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments