The first large-scale research project evaluating the characteristics of women involved in jihadism-inspired terrorism finds significant differences between men and… Read more Study Highlights How Little We Know About Women Terrorists
Author: Ghost Security Group™
In a first, Israel responds to Hamas hackers with an air strike | ZDNet
Israel’s response against Hamas marks the first time that a country has reacted with immediate military force to a cyberattack… Read more In a first, Israel responds to Hamas hackers with an air strike | ZDNet
UK’s National Cyber Security Centre Releases Top 100k Most-Used Passwords
We at Ghost Security Group™ deal with Islamic State hackers attempting to breach web sites on a daily basis, either… Read more UK’s National Cyber Security Centre Releases Top 100k Most-Used Passwords
Asynchronous Warfare part 3: How Conventional Strategies and Tactics Are Applied to Cyberwarfare
While the threat of militarized terrorism is important to monitor (i.e. lone wolves and sleeper cells), the larger threats to… Read more Asynchronous Warfare part 3: How Conventional Strategies and Tactics Are Applied to Cyberwarfare
Court Filings for Mark Steven Domingo – Foiled L.A. Terror Plot
The FBI Monday said the agency had foiled a domestic terror plot by an American military veteran, who was aiming… Read more Court Filings for Mark Steven Domingo – Foiled L.A. Terror Plot
Hacker Finds He Can Remotely Kill Car Engines After Breaking Into GPS Tracking Apps
By reverse engineering ProTrack and iTrack’s Android apps, L&M said he realized that all customers are given a default password… Read more Hacker Finds He Can Remotely Kill Car Engines After Breaking Into GPS Tracking Apps
FINTEAM: Trojanized TeamViewer Against Government Targets – Check Point Research
Introduction Recently, Check Point researchers spotted a targeted attack against officials within government finance authorities and representatives in several embassies… Read more FINTEAM: Trojanized TeamViewer Against Government Targets – Check Point Research
FBI’s Crime Complaint Center (IC3) 2018 Internet Crime Report
The 2018 Internet Crime Report emphasizes the IC3’s efforts in monitoring trending scams such as Business Email Compromise (BEC), Extortion,… Read more FBI’s Crime Complaint Center (IC3) 2018 Internet Crime Report
Analyzing lone-actor terrorism in context
This article is published courtesy of the Center for Research and Evidence on Security Threats (CREST) Assessing and managing the risk of lone-actor terrorism… Read more Analyzing lone-actor terrorism in context
Gmail first to follow new SMTP standards
SMTP TLS ReportingA number of protocols exist for establishing encrypted channels between SMTP Mail Transfer Agents (MTAs), including STARTTLS, DNS-Based… Read more Gmail first to follow new SMTP standards
You must be logged in to post a comment.