
Do Hacktivists Hack Businesses?
Why do Hacktivists Hack? Unlike hardened cyber criminals who hack for commercial or geo-political gains, hacktivists hack mainly to prove…
Twenty years ago, if asked to describe a security team at a large corporation, one would likely conjure up images of guards staffing the front door and night watchmen walking the halls after closing. Today, a different security staff is devoted to protecting against threats streaming in through networks and mobile devices.The Enterprise security channel at BrightHub.com offers expert advice and information on a variety of IT-related issues including computer network and information security, as well as online privacy concerns. From the daily annoyances of spam, virus and malware protection to the growing threat of database hacking, large businesses are devoting large budgets to IT security.Managing Editor Michele McDonough and her team of technical writers offer up-to-date, expert advice and information on the increasing IT security concerns facing large businesses today. IT staff and security specialists are invited to join the discussion and voice your opinion in teh comments. Find the expert information you’re searching, and a community of security professionals at BrightHub.com.

Why do Hacktivists Hack? Unlike hardened cyber criminals who hack for commercial or geo-political gains, hacktivists hack mainly to prove…

A Matter of Keeping the Security Systems Up to Date The appraisal and examination of a building’s security system should not be…

Regardless of the robustness of the security apparatus in place, breaches invariably occur. A determined cyber criminal may exploit…

`` Credit Card Skimming Credit card fraud is a major issue that affects everyone. Walk into just about any office supply store or other…

The Need for Building Stronger Evidence against Cyber Criminals After the March 2011 security breach that assailed the security of…

Transit Risks Any data stored online, with a URL address remains open to indexing by search engine bots. Google, however, assures users…

Clickjacking attacks are conducted by transparently overlaying some benign web element with some other function, input field, button etc.…

The Continuing Threat of Cyber Crime According the the 2011 Verizon Data Breach Investigations report (released in 2010) over 4 million…

Recipients and service providers have no option but to incur time and costs for transmitting, accessing, reviewing, storing, and…

You Need More Than Just Software As you know, big companies can afford to outsource or hire people to help them with cyber security. You…