Blog Posts - Hacktivism



Hacktivism of The Day: Anonymous Just Released The Contact Info of KKK Members

November 3, 2015 at 05:08AM It's a bad day to be in the KKK.The hacktivist collective Anonymous just released the phone numbers and emails of about 40 alleged members of the Ku Klux Klan terrorist group.You can view the full list here.It seems that p...
by viralpx on Nov 2, 2015

Hacking of the National Institute of Epidemiology and Musings on Hacktivism

Yesterday, my friend and medical blogging maestro, SoumyadeepB brought this to my notice: National Institute of #Epidemiology, #India hacked .. @scepticemia might interest you http://t.co/Zm3Uc55yon— Soumyadeep Bhaumik (@DrSoumyadeepB) January...
by Scepticemia on Jan 28, 2014

Partying Like It's 1984...

As much as I enjoy seeing heroic whistleblowers like Edward Snowden and Bradley Manning in the news, I don't understand why more people aren't pissed off at what's happening to them. Are there seriously so many Americans with stars and stripes shoved...

Aiding and Abetting the Enemy...Manning's Song...

As Pfc. Bradley Manning's military court martial moves through the closing arguments, we have one last chance as a society to decide what's important to us. Manning is accused of various treasonous charges, but is he really a Benedict Arnold? What wi...

Cyber Threats History: A New Cold War (Present)

This is the decade of cloud computing, the rise of hacktivism and the birth of real cyberwarfare. Who knows what else is going to happen? Cyber attacks continue to rise at a great pace, increasing 42 percent in 2012 from the previous year and IT secu...
by The Trembling Uterus on Feb 26, 2013

Surf The Net Anonymously.

WHAT ? TOR is a software that allows you to surf the net anonymously. In this way, your privacy is safe and the possibility of your information being recorded is almost nil. Tor can be a great help to those people who live in dictatorships and where...
by Ziurby on Feb 6, 2013

Cyber Threats History: A New World (2000s)

In this new decade, the average consumer is persuaded to use the credit card on the Internet for purchases, raising the risks of cyber theft. Insurance policies are offered by most credit cards companies and former hackers are hired by the industry t...
by The Trembling Uterus on Feb 6, 2013

#Anonymous Hack MIT Sites: In Memoriam, Aaron Swartz

The online vigilante justice group, anonymous, has hit out at the MIT for the role they purportedly played in bringing about the demise of Aaron Swartz. They took down the Cogeneration Project page and another page which seems to not be loading now.
by Scepticemia on Jan 14, 2013

#Anonymous Hack MIT Sites: In Memoriam, Aaron Swartz

The online vigilante justice group, anonymous, has hit out at the MIT for the role they purportedly played in bringing about the demise of Aaron Swartz. They took down the Cogeneration Project page and another page which seems to not be loading now.
by Scepticemia on Jan 14, 2013

Cyber Threats History: The Internet Expansion (1990s)

Although hacking expanded and enjoyed glorification during the 80s, a divide was forming within the hacking community by the end of the decade. The hacker principle of “freedom of technology” was changing, and a younger generation interested in i...
by The Trembling Uterus on Jan 14, 2013

2013 Open Group Predictions, Vol. 1

As we wrap up 2012, we couldn't help but look towards what is to come in 2013 for The Open Group and the industries we‘re a part of. Without further ado, here they are... Continue reading →...
by The Open Group Blog on Jan 2, 2013

How to Protect Yourself from Online Security Threats of 2013

Next year will be the year of the mobile security threat, according to Internet security software giant McAfee, based on the predictions report it released today of the leading security threats expected in 2013. With online technology rapidly movin...
by Social Media Blog on Dec 28, 2012

Cyber Threats History: Rise of the Hacker Culture (1980s)

After John Draper and his electronic whistling abilities gained a wide audience, there was a major shift in computing and hacking enjoyed a golden era of sorts in the 1980s. Society started becoming aware of hackers as computers became increasingly a...
by The Trembling Uterus on Oct 25, 2012

Cyber Threats History: An Overview

Before going over the history of cyberspace threats, let me take a moment to define what they are and to categorize them according to my personal view. A cyber threat can be loosely defined as a conscious attempt to obtain unauthorized access to a...
by The Trembling Uterus on Oct 12, 2012

Cyber Threats History (I): An Overview

Before going over the history of cyberspace threats, let me take a moment to define what they are and to categorize them according to my personal view. A cyber threat can be loosely defined as a conscious attempt to obtain unauthorized access to a...
by The Trembling Uterus on Oct 12, 2012


Trending Topics

Close