Vulnerabilities / Threats
2/28/2013
10:16 AM
50%
50%

Anonymous: 10 Things We've Learned In 2013

The Anonymous hacker group continues to seek equal measures of revenge, justice and reform -- preferably through chaotic means -- for perceived wrongdoings.
Previous
10 of 10
Next


The efforts of Anonymous and other groups calling for government reforms in the wake of Swartz's death have already started to have an effect, with the White House now saying that more federally funded research must be released for free.

Notably, the White House Office of Science and Technology Policy (OSTP) announced this week that it has directed federal agencies that spend over $100 million annually "to develop plans to make the published results of federally funded research freely available to the public within one year of publication," according to a blog post by Michael Stebbins, assistant director for biotechnology at the OSTP.

"The final policy reflects substantial inputs from scientists and scientific organizations, publishers, members of Congress, and other members of the public -- over 65,000 of whom recently signed a We the People petition asking for expanded public access to the results of taxpayer-funded research," said the post.

Photo courtesy of Flickr user Poster Boy.

RECOMMENDED READING:

Anonymous Plays Games With U.S. Sites

Hacking, Privacy Laws: Time To Reboot

Anonymous Claims Wall Street Data Dump

Anonymous Takes On State Department, More Banks

Anonymous Says DDoS Attacks Like Free Speech

U.S. Bank Hack Attack Techniques Identified

Bank Attacker Iran Ties Questioned By Security Pros

Anonymous DDoS Attackers In Britain Sentenced

Previous
10 of 10
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
EslamP248
50%
50%
EslamP248,
User Rank: Apprentice
8/15/2013 | 10:38:40 PM
re: Anonymous: 10 Things We've Learned In 2013
eslamp 248
EslamP248
50%
50%
EslamP248,
User Rank: Apprentice
8/15/2013 | 10:38:29 PM
re: Anonymous: 10 Things We've Learned In 2013
top covere pix
EslamP248
50%
50%
EslamP248,
User Rank: Apprentice
8/15/2013 | 10:38:11 PM
re: Anonymous: 10 Things We've Learned In 2013
my friends
EslamP248
50%
50%
EslamP248,
User Rank: Apprentice
8/15/2013 | 10:36:39 PM
re: Anonymous: 10 Things We've Learned In 2013
eslampop785
EslamP248
50%
50%
EslamP248,
User Rank: Apprentice
8/15/2013 | 10:36:30 PM
re: Anonymous: 10 Things We've Learned In 2013
eslampop
EslamP248
50%
50%
EslamP248,
User Rank: Apprentice
8/15/2013 | 10:14:14 PM
re: Anonymous: 10 Things We've Learned In 2013
facebook
majenkins
50%
50%
majenkins,
User Rank: Apprentice
4/24/2013 | 5:10:14 PM
re: Anonymous: 10 Things We've Learned In 2013
Revenge yes, justice only their own eyes, and reform only to remake the world to comform their ideas.
PJS880
50%
50%
PJS880,
User Rank: Ninja
3/14/2013 | 11:12:35 PM
re: Anonymous: 10 Things We've Learned In 2013
Great article but I have to agree with Leo, I dislike reading these articles for that reason alone. All though the topics are of interest, I donG«÷t have the patience. I also have to disagree with Jonathan on his views on people and their awareness about their online security. I believe because of all the attacks and breeches and the general publicG«÷s knowledge is constantly increasing, which was the exact opposite in the past.

Paul Sprague
InformationWeek Contributor
Jonathan_Camhi
50%
50%
Jonathan_Camhi,
User Rank: Apprentice
3/5/2013 | 9:47:33 PM
re: Anonymous: 10 Things We've Learned In 2013
I hadn't heard of this Rustle League incident before. Hackers hacking hackers. I wonder if all of the news surrounding hacking and cybercrime lately could put a big enough dent in people's trust in the internet to actually change people's behavior. Will people start taking their individual online security more seriously? Personally, I doubt it. I feel like we have already developed a sort of blind trust in the internet because it makes our lives so convenient that we don't even want to consider what would happen if our online credentials were compromised.
Leo Regulus
50%
50%
Leo Regulus,
User Rank: Apprentice
3/3/2013 | 8:54:42 PM
re: Anonymous: 10 Things We've Learned In 2013
Information Week only had one important New Year's Resolution this year. '"No Slide Show Articles with out a prominent 'View-as-one-page' link." How's that working out for you so far?
Page 1 / 2   >   >>
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2004-2771
Published: 2014-12-24
The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.

CVE-2014-3569
Published: 2014-12-24
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshak...

CVE-2014-4322
Published: 2014-12-24
drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain offset, length, and base values within an ioctl call, which allows attackers to gain privileges or c...

CVE-2014-6132
Published: 2014-12-24
Cross-site scripting (XSS) vulnerability in the Web UI in IBM WebSphere Service Registry and Repository (WSRR) 6.3 through 6.3.0.5, 7.0.x through 7.0.0.5, 7.5.x through 7.5.0.4, 8.0.x before 8.0.0.3, and 8.5.x before 8.5.0.1 allows remote authenticated users to inject arbitrary web script or HTML vi...

CVE-2014-6153
Published: 2014-12-24
The Web UI in IBM WebSphere Service Registry and Repository (WSRR) 6.3.x through 6.3.0.5, 7.0.x through 7.0.0.5, 7.5.x through 7.5.0.4, 8.0.x before 8.0.0.3, and 8.5.x before 8.5.0.1 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.