Skip to content
  • Home
  • ABOUT
    • CAPABILITIES
    • PRESS
  • FAQ
  • BLOG
  • CONTACT
    • Public PGP Keys
  • RESEARCH
    • SECURITY AND COUNTER-TERROR NEWS
    • LINKS OF INTEREST
    • TERROR FLAGS

Ghost Security Group™

Ghost Security Group™ is a counterterrorism organization that combats extremism on the digital front lines using the internet as a weapon.

Category: Uncategorized

Analysing Lone-Actor Terrorism In Context

Posted on July 17, 2019 by Ghost Security Group™

Assessing and managing the risk of lone-actor terrorism is a challenge, as events around the world continue to show. In… Read more Analysing Lone-Actor Terrorism In Context

Before Connecting an IoT Device, Check Out a New NIST Report for Cybersecurity Advice | NIST

Posted on June 28, 2019 by Ghost Security Group™

From the National Institute of Standards and Technology: Seemingly every appliance we use comes in a version that can be… Read more Before Connecting an IoT Device, Check Out a New NIST Report for Cybersecurity Advice | NIST

Operationalizing Cyberspace as a Military Domain: Lessons for NATO | RAND

Posted on June 27, 2019 by Ghost Security Group™

The authors of this Perspective review the new security challenges NATO faces and discuss current efforts by NATO to consider… Read more Operationalizing Cyberspace as a Military Domain: Lessons for NATO | RAND

New Yorker who tried to join ISIS sentenced to 20 years in prison

Posted on June 18, 2019 by Ghost Security Group™

A New York man who attempted to join the Islamic State was sentenced to 20 years in prison after he… Read more New Yorker who tried to join ISIS sentenced to 20 years in prison

Cyber Actors Exploit ‘Secure’ Websites In Phishing Campaigns

Posted on June 13, 2019 by Ghost Security Group™

Warning: Just because you see the green lock and “https” in the URL does NOT mean it’s 100% secure. Always… Read more Cyber Actors Exploit ‘Secure’ Websites In Phishing Campaigns

ALL THE WAYS GOOGLE TRACKS YOU—AND HOW TO STOP IT

Posted on May 27, 2019May 28, 2019 by Ghost Security Group™

The best way to minimize the chances of your personal data being hacked/leaked is to limit the amount that is… Read more ALL THE WAYS GOOGLE TRACKS YOU—AND HOW TO STOP IT

Windows 10 is a step closer to never needing passwords

Posted on May 12, 2019 by Ghost Security Group™

“People don’t like passwords because we have to remember them. As a result, we often create passwords that are easy… Read more Windows 10 is a step closer to never needing passwords

In a first, Israel responds to Hamas hackers with an air strike | ZDNet

Posted on May 6, 2019 by Ghost Security Group™

Israel’s response against Hamas marks the first time that a country has reacted with immediate military force to a cyberattack… Read more In a first, Israel responds to Hamas hackers with an air strike | ZDNet

Asynchronous Warfare part 3: How Conventional Strategies and Tactics Are Applied to Cyberwarfare

Posted on April 30, 2019 by Ghost Security Group™

While the threat of militarized terrorism is important to monitor (i.e. lone wolves and sleeper cells), the larger threats to… Read more Asynchronous Warfare part 3: How Conventional Strategies and Tactics Are Applied to Cyberwarfare

Hacker Finds He Can Remotely Kill Car Engines After Breaking Into GPS Tracking Apps

Posted on April 29, 2019 by Ghost Security Group™

By reverse engineering ProTrack and iTrack’s Android apps, L&M said he realized that all customers are given a default password… Read more Hacker Finds He Can Remotely Kill Car Engines After Breaking Into GPS Tracking Apps

Posts navigation

Older posts
Newer posts
My Tweets

Recent Posts

  • Ransomware
  • US Takes Out ISIS Leader Du Jour, Abu Ibrahim al-Hashimi al-Qurayshi
  • ISIS Media Website Gets Whacked
  • REvil Malware Hackers Gone Missing
  • Man Sentenced to 20 Years in Prison for Attempting to Provide Material Support to ISIS

Recent Comments

GhostSec’s joint ran… on Ransomware
Alert: GhostSec and… on Ransomware
Alert: GhostSec and… on Ransomware
Alert: GhostSec and… on Ransomware
Alert: GhostSec and… on Ransomware

Archives

  • November 2023
  • February 2022
  • August 2021
  • July 2021
  • May 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • January 2018
  • December 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • December 2016
  • November 2015

Categories

  • Algeria
  • arrests
  • Baghdadi
  • Civilian Security
  • Cyber
  • Financing
  • Hacking
  • Iraq
  • ISIS
  • Kenya
  • Michigan
  • National Security
  • New York
  • News
  • NSA
  • Pedo
  • Research
  • Russia
  • Syria
  • Technology
  • Terrorism
  • Tunisia
  • Turkey
  • UK
  • Uncategorized
  • US

Meta

  • Create account
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com
  • Facebook
  • X
  • Instagram
  • LinkedIn
  • YouTube
  • Vimeo

© 2015-2025 Ghost Security Group™. All rights reserved.

“Ghost Security Group”, “GhostSecGroup”, “GhostSec” and all other trademarks, service marks, trade names and logos of Ghost Security Group™ appearing on the Ghost Security Group™ site are the property of Ghost Security Group™. All uses of such marks shall inure to the benefit of Ghost Security Group™, and the use of Ghost Security Group™’s marks in conjunction with any other logos or marks shall not create a unitary or composite mark. All other trademarks, trade names, service marks, logos, product names, and company names appearing on the Ghost Security Group™ Site are the property of their respective owners.

Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Subscribe Subscribed
    • Ghost Security Group™
    • Join 170 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Ghost Security Group™
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

You must be logged in to post a comment.