#1 Trusted Cybersecurity News Platform
Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Cybersecurity

Internet Law | Breaking Cybersecurity News | The Hacker News

Category — Internet Law
Anonymous Targets WikiLeaks Critics in Operation Payback Campaign

Anonymous Targets WikiLeaks Critics in Operation Payback Campaign

Dec 11, 2010
Do you support WikiLeaks? Are you angry at critics trying to suppress it? Maybe you're considering joining online protests to shut down the websites of its opponents. Don't. A group of vigilantes named Anonymous has turned their Operation Payback campaign, previously targeting antipiracy organizations, on PayPal, Visa, MasterCard, Senator Joe Lieberman, Sarah Palin, and others who have criticized WikiLeaks or stopped doing business with the document-sharing project. The fallout from WikiLeaks has reached a fever pitch since the site began releasing diplomatic cables last month, causing embarrassment for U.S. diplomatic efforts. Launching denial-of-service (DOS) attacks against target websites to send a message and disrupt their operations is the modern-day equivalent of walking the picket line with a sign. However, the electronic version is illegal. "Participating in a botnet with the intention of shutting down a website violates the Computer Fraud and Abuse Act,"
China Introduces New Laws to Combat Cyber Hacking

China Introduces New Laws to Combat Cyber Hacking

Nov 14, 2010
China is taking decisive action against computer hacking with a new law set to govern the sentencing of hackers and other internet offenders. This initiative, announced by the Ministry of Public Security, aims to enhance cybersecurity in response to the growing threat of cybercrime. Lawmakers are currently working on judicial interpretations of these new regulations. Gu Jian, deputy director of the Ministry's Network Security Protection Bureau, stated that these rules are expected to be released by the end of the year. This development represents China's latest effort to strengthen security against cybercrime. Since 2004, more than 1.64 million online offenses have been reported to China's Internet Illegal Information Reporting Center. Although 80% of these cases involve online pornography and scams, hacking incidents are on the rise. Gu noted that eight out of ten computers with internet access in China are now suffering from "botnet attacks." In these attacks
Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches

Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches

Sep 10, 2024SaaS Security / Risk Management
Shadow apps, a segment of Shadow IT, are SaaS applications purchased without the knowledge of the security team. While these applications may be legitimate, they operate within the blind spots of the corporate security team and expose the company to attackers.  Shadow apps may include instances of software that the company is already using. For example, a dev team may onboard their own instance of GitHub to keep their work separate from other developers. They might justify the purchase by noting that GitHub is an approved application, as it is already in use by other teams. However, since the new instance is used outside of the security team's view, it lacks governance. It may store sensitive corporate data and not have essential protections like MFA enabled, SSO enforced, or it could suffer from weak access controls. These misconfigurations can easily lead to risks like stolen source code and other issues. Types of Shadow Apps  Shadow apps can be categorized based on their interac
Expert Insights / Articles Videos
Cybersecurity Resources