Knowledge

Crimeware

Source 📝

1179: 567:
The cybercrime landscape has shifted from individuals developing their own tools to a market where crimeware, tools and services for illegal online activities, can be easily acquired in online marketplaces. These crimeware markets are expected to expand, especially targeting mobile devices.
697:
Crimeware can have a significant economic impact due to loss of sensitive and proprietary information and associated financial losses. One survey estimates that in 2005 organizations lost in excess of $ 30 million due to the theft of proprietary information. The
677:. These social-engineered threats often arrive disguised as a valid e-mail message and include specific company information and sender addresses. The malicious e-mails use social engineering to manipulate users to open the attachment and execute the payload. 555:
or technical stealth in order to access a computer user's financial and retail accounts for the purpose of taking funds from those accounts or completing unauthorized transactions on behalf of the cyberthief. Alternatively, crimeware may steal
702:
of financial or confidential information from corporate networks often places the organizations in violation of government and industry-imposed regulatory requirements that attempt to ensure that financial, personal and confidential.
943: 1031: 1041: 720: 232: 896: 1073: 572: 877: 741: 1855: 1006: 512: 575:
in February 2005 in an Anti-Phishing Working Group response to the FDIC article "Putting an End to Account-Hijacking Identity Theft".
1617: 731: 1707: 552: 1594: 939: 583:
Criminals use a variety of techniques to steal confidential data through crimeware, including through the following methods:
342: 1625: 1066: 736: 36: 1972: 1663: 1557: 820: 1353: 1860: 1607: 53: 1687: 505: 1926: 1420: 1059: 445: 242: 125: 115: 960:
Sood, Aditya (2013). "Crimeware-as-a-service—A survey of commoditized crimeware in the underground market".
152: 140: 1612: 1533: 1333: 681: 631:
Enable remote access into applications, allowing criminals to break into networks for malicious purposes.
227: 595:—login and password information for online bank accounts, for example—and report them back to the thief. 1946: 1589: 1547: 1203: 654:
Crimeware threats can be installed on victims' computers through multiple delivery vectors, including:
464: 202: 2003: 1814: 1450: 1168: 1015: 685: 658: 498: 247: 628:
Hijack a user session at a financial institution and drain the account without the user's knowledge.
1748: 1738: 1435: 1313: 1208: 423: 382: 352: 302: 1824: 1523: 1475: 1138: 162: 1875: 1702: 726: 417: 1809: 1656: 1564: 1298: 667:
vulnerability to steal passwords and monitor user input on webmail and online commerce sites.
1003: 1982: 1977: 1936: 1865: 1723: 1584: 1496: 1445: 1390: 1258: 1231: 1213: 1111: 1082: 435: 377: 297: 1178: 8: 2008: 1931: 1368: 1143: 1101: 412: 237: 147: 1916: 1753: 1733: 1552: 1480: 1385: 882: 774: 758: 715: 1941: 1895: 1804: 1600: 1358: 1293: 1243: 1190: 1148: 1096: 816: 663: 588: 407: 370: 337: 1956: 1921: 1649: 1569: 1509: 1273: 1263: 1158: 1021: 969: 769: 763: 670: 561: 387: 88: 836:
Gad, Mamoud (2014). "Crimeware Marketplaces and Their Facilitating Technologies".
564:
as many malicious code threats seek to pilfer valuable, confidential information.
1951: 1890: 1794: 1460: 1440: 1338: 1163: 1153: 1010: 947: 557: 167: 58: 27: 973: 1911: 1885: 1692: 1630: 1528: 1378: 1328: 1303: 1268: 1248: 1128: 1116: 790: 592: 560:
or sensitive corporate information. Crimeware represents a growing problem in
548: 533: 476: 307: 260: 190: 71: 48: 1997: 1870: 1789: 1697: 1540: 1501: 1470: 1465: 1318: 1308: 1278: 312: 207: 104: 1728: 1574: 1430: 1133: 400: 267: 220: 75: 855: 1880: 1799: 1514: 1348: 1323: 1288: 1123: 611: 607: 599: 470: 357: 94: 1839: 1819: 1784: 1579: 1395: 1343: 1226: 1106: 1051: 642: 634: 327: 322: 99: 606:
controlled by the thief even when the user types the website's proper
1829: 1455: 1410: 1405: 1221: 661:
in Web applications. The Bankash.G Trojan, for example, exploited an
622: 347: 177: 82: 43: 1415: 1373: 1236: 897:"Pharming explained: How attackers use fake websites to steal data" 780: 615: 603: 441: 172: 120: 1834: 1743: 1672: 1641: 1425: 1400: 1363: 785: 753: 638: 540: 529: 429: 317: 292: 285: 157: 1774: 1769: 1283: 1198: 637:
all data on a computer and require the user to pay a ransom to
544: 483: 332: 272: 110: 1042:"Crimeware gets worse - How to avoid being robbed by your PC" 699: 16:
Class of malware designed specifically to automate cybercrime
962:
International Journal of Critical Infrastructure Protection
674: 858:. Federal Deposit Insurance Corporation. 5 January 2004 810: 856:"Putting an End to Account-Hijacking Identity Theft" 721:
Health Insurance Portability and Accountability Act
1032:"Cyber Crooks Target Public & Private Schools" 940:Protecting Corporate Assets from E-mail Crimeware 813:Crimeware: Understanding New Attacks and Defenses 1995: 1657: 1067: 506: 1022:"Real-Time Hackers Foil Two-Factor Security" 742:Payment Card Industry Data Security Standard 1664: 1650: 1074: 1060: 918: 916: 513: 499: 1618:Security information and event management 811:Jakobsson, M; Ramzan, Z. (6 April 2008). 732:Family Educational Rights and Privacy Act 1081: 1004:Symantec Internet Security Threat Report 878:Cyberthieves Silently Copy Your Password 1018:(Archived: August 8, 2002, at 22:18:34) 988:Computer Crime and Security Survey 2005 913: 894: 838:Technology innovation management review 793:, Perhaps the best known banking trojan 1996: 1708:Timeline of computer viruses and worms 1645: 1595:Host-based intrusion detection system 1055: 959: 848: 1626:Runtime application self-protection 835: 804: 649: 233:forensics-focused operating systems 13: 1671: 1177: 737:California Senate Bill 1386 (2002) 532:designed specifically to automate 14: 2020: 1973:Computer and network surveillance 1558:Security-focused operating system 997: 923:Symantec Internet Security Report 711:US laws and regulations include: 571:The term crimeware was coined by 1354:Insecure direct object reference 706: 1608:Information security management 815:. Addison-Wesley Professional. 54:Hacking of consumer electronics 1688:Comparison of computer viruses 980: 953: 932: 888: 870: 829: 1: 1927:Data loss prevention software 797: 547:) is designed to perpetrate 539:Crimeware (as distinct from 153:Chaos Communication Congress 7: 1613:Information risk management 1534:Multi-factor authentication 1090:Related security categories 1016:Computer Security Institute 974:10.1016/j.ijcip.2013.01.002 895:Swinhoe, Dan (2020-04-23). 747: 692: 578: 10: 2025: 1947:Intrusion detection system 1590:Intrusion detection system 1548:Computer security software 1204:Advanced persistent threat 625:cached on a user's system. 465:2600: The Hacker Quarterly 203:List of computer criminals 1965: 1904: 1848: 1815:Privacy-invasive software 1762: 1716: 1680: 1489: 1189: 1175: 1169:Digital rights management 1089: 946:January 21, 2012, at the 1314:Denial-of-service attack 1209:Arbitrary code execution 777:, A small banking trojan 587:Surreptitiously install 383:Cloud computing security 1825:Rogue security software 1524:Computer access control 1476:Rogue security software 1139:Electromagnetic warfare 766:, A PHP-based crimeware 163:Hackers on Planet Earth 1861:Classic Mac OS viruses 1703:List of computer worms 1570:Obfuscation (software) 1299:Browser Helper Objects 1183: 727:Gramm-Leach-Bliley Act 688:on servers and clients 418:Homebrew Computer Club 1565:Data-centric security 1446:Remote access trojans 1181: 1048:, September 26, 2009) 1038:, September 14, 2009) 1028:, September 18, 2009) 1983:Operation: Bot Roast 1497:Application security 1391:Privilege escalation 1259:Cross-site scripting 1112:Cybersex trafficking 1083:Information security 436:Masters of Deception 378:Application security 1932:Defensive computing 1849:By operating system 1144:Information warfare 1102:Automotive security 929:, March 2006, p. 71 604:counterfeit website 413:Chaos Computer Club 148:Black Hat Briefings 22:Part of a series on 1917:Antivirus software 1763:Malware for profit 1734:Man-in-the-browser 1681:Infectious malware 1553:Antivirus software 1421:Social engineering 1386:Polymorphic engine 1339:Fraudulent dialers 1244:Hardware backdoors 1184: 1009:2006-11-15 at the 950:Avinti, Inc., p.1, 883:The New York Times 775:Tiny Banker Trojan 759:Metasploit Project 716:Sarbanes-Oxley Act 598:Redirect a user's 553:social engineering 243:Social engineering 1991: 1990: 1942:Internet security 1896:HyperCard viruses 1805:Keystroke logging 1795:Fraudulent dialer 1739:Man-in-the-middle 1639: 1638: 1601:Anomaly detection 1506:Secure by default 1359:Keystroke loggers 1294:Drive-by download 1182:vectorial version 1149:Internet security 1097:Computer security 1026:Technology Review 664:Internet Explorer 589:keystroke loggers 523: 522: 371:Computer security 338:Keystroke logging 2016: 2004:Types of malware 1957:Network security 1922:Browser security 1666: 1659: 1652: 1643: 1642: 1510:Secure by design 1441:Hardware Trojans 1274:History sniffing 1264:Cross-site leaks 1159:Network security 1076: 1069: 1062: 1053: 1052: 991: 984: 978: 977: 957: 951: 936: 930: 920: 911: 910: 908: 907: 892: 886: 874: 868: 867: 865: 863: 852: 846: 845: 833: 827: 826: 808: 770:Targeted attacks 764:MPack (software) 671:Targeted attacks 650:Delivery vectors 614:, also known as 562:network security 515: 508: 501: 388:Network security 89:Hacker Manifesto 28:Computer hacking 19: 18: 2024: 2023: 2019: 2018: 2017: 2015: 2014: 2013: 1994: 1993: 1992: 1987: 1966:Countermeasures 1961: 1952:Mobile security 1900: 1891:Palm OS viruses 1856:Android malware 1844: 1758: 1754:Zombie computer 1712: 1676: 1670: 1640: 1635: 1485: 1185: 1173: 1164:Copy protection 1154:Mobile security 1085: 1080: 1036:Washington Post 1011:Wayback Machine 1000: 995: 994: 985: 981: 958: 954: 948:Wayback Machine 937: 933: 921: 914: 905: 903: 893: 889: 875: 871: 861: 859: 854: 853: 849: 834: 830: 823: 809: 805: 800: 750: 709: 695: 686:vulnerabilities 659:Vulnerabilities 652: 581: 519: 490: 489: 459: 451: 450: 403: 393: 392: 373: 363: 362: 288: 278: 277: 263: 253: 252: 223: 213: 212: 193: 183: 182: 168:Security BSides 143: 133: 132: 78: 64: 63: 59:List of hackers 39: 17: 12: 11: 5: 2022: 2012: 2011: 2006: 1989: 1988: 1986: 1985: 1980: 1975: 1969: 1967: 1963: 1962: 1960: 1959: 1954: 1949: 1944: 1939: 1934: 1929: 1924: 1919: 1914: 1912:Anti-keylogger 1908: 1906: 1902: 1901: 1899: 1898: 1893: 1888: 1886:Mobile malware 1883: 1878: 1873: 1868: 1863: 1858: 1852: 1850: 1846: 1845: 1843: 1842: 1837: 1832: 1827: 1822: 1817: 1812: 1807: 1802: 1797: 1792: 1787: 1782: 1777: 1772: 1766: 1764: 1760: 1759: 1757: 1756: 1751: 1746: 1741: 1736: 1731: 1726: 1720: 1718: 1714: 1713: 1711: 1710: 1705: 1700: 1695: 1693:Computer virus 1690: 1684: 1682: 1678: 1677: 1669: 1668: 1661: 1654: 1646: 1637: 1636: 1634: 1633: 1631:Site isolation 1628: 1623: 1622: 1621: 1615: 1605: 1604: 1603: 1598: 1587: 1582: 1577: 1572: 1567: 1562: 1561: 1560: 1555: 1545: 1544: 1543: 1538: 1537: 1536: 1529:Authentication 1521: 1520: 1519: 1518: 1517: 1507: 1504: 1493: 1491: 1487: 1486: 1484: 1483: 1478: 1473: 1468: 1463: 1458: 1453: 1448: 1443: 1438: 1433: 1428: 1423: 1418: 1413: 1408: 1403: 1398: 1393: 1388: 1383: 1382: 1381: 1371: 1366: 1361: 1356: 1351: 1346: 1341: 1336: 1331: 1329:Email spoofing 1326: 1321: 1316: 1311: 1306: 1301: 1296: 1291: 1286: 1281: 1276: 1271: 1269:DOM clobbering 1266: 1261: 1256: 1251: 1249:Code injection 1246: 1241: 1240: 1239: 1234: 1229: 1224: 1216: 1211: 1206: 1201: 1195: 1193: 1187: 1186: 1176: 1174: 1172: 1171: 1166: 1161: 1156: 1151: 1146: 1141: 1136: 1131: 1129:Cyberterrorism 1126: 1121: 1120: 1119: 1117:Computer fraud 1114: 1104: 1099: 1093: 1091: 1087: 1086: 1079: 1078: 1071: 1064: 1056: 1050: 1049: 1039: 1029: 1019: 1013: 999: 998:External links 996: 993: 992: 979: 952: 931: 912: 887: 869: 847: 828: 821: 802: 801: 799: 796: 795: 794: 791:Zeus (malware) 788: 783: 778: 772: 767: 761: 756: 749: 746: 745: 744: 739: 734: 729: 724: 718: 708: 705: 694: 691: 690: 689: 678: 668: 651: 648: 647: 646: 632: 629: 626: 619: 596: 593:sensitive data 580: 577: 549:identity theft 528:is a class of 521: 520: 518: 517: 510: 503: 495: 492: 491: 488: 487: 480: 477:Nuts and Volts 473: 468: 460: 457: 456: 453: 452: 449: 448: 439: 433: 427: 424:Legion of Doom 421: 415: 410: 404: 399: 398: 395: 394: 391: 390: 385: 380: 374: 369: 368: 365: 364: 361: 360: 355: 350: 345: 340: 335: 330: 325: 320: 315: 310: 305: 300: 295: 289: 284: 283: 280: 279: 276: 275: 270: 264: 261:Practice sites 259: 258: 255: 254: 251: 250: 245: 240: 235: 230: 224: 219: 218: 215: 214: 211: 210: 205: 200: 194: 191:Computer crime 189: 188: 185: 184: 181: 180: 175: 170: 165: 160: 155: 150: 144: 139: 138: 135: 134: 131: 130: 129: 128: 123: 118: 107: 102: 97: 92: 85: 79: 72:Hacker culture 70: 69: 66: 65: 62: 61: 56: 51: 49:Cryptovirology 46: 40: 35: 34: 31: 30: 24: 23: 15: 9: 6: 4: 3: 2: 2021: 2010: 2007: 2005: 2002: 2001: 1999: 1984: 1981: 1979: 1976: 1974: 1971: 1970: 1968: 1964: 1958: 1955: 1953: 1950: 1948: 1945: 1943: 1940: 1938: 1935: 1933: 1930: 1928: 1925: 1923: 1920: 1918: 1915: 1913: 1910: 1909: 1907: 1903: 1897: 1894: 1892: 1889: 1887: 1884: 1882: 1879: 1877: 1876:MacOS malware 1874: 1872: 1871:Linux malware 1869: 1867: 1864: 1862: 1859: 1857: 1854: 1853: 1851: 1847: 1841: 1838: 1836: 1833: 1831: 1828: 1826: 1823: 1821: 1818: 1816: 1813: 1811: 1808: 1806: 1803: 1801: 1798: 1796: 1793: 1791: 1790:Form grabbing 1788: 1786: 1783: 1781: 1778: 1776: 1773: 1771: 1768: 1767: 1765: 1761: 1755: 1752: 1750: 1747: 1745: 1742: 1740: 1737: 1735: 1732: 1730: 1727: 1725: 1722: 1721: 1719: 1715: 1709: 1706: 1704: 1701: 1699: 1698:Computer worm 1696: 1694: 1691: 1689: 1686: 1685: 1683: 1679: 1674: 1667: 1662: 1660: 1655: 1653: 1648: 1647: 1644: 1632: 1629: 1627: 1624: 1619: 1616: 1614: 1611: 1610: 1609: 1606: 1602: 1599: 1596: 1593: 1592: 1591: 1588: 1586: 1583: 1581: 1578: 1576: 1573: 1571: 1568: 1566: 1563: 1559: 1556: 1554: 1551: 1550: 1549: 1546: 1542: 1541:Authorization 1539: 1535: 1532: 1531: 1530: 1527: 1526: 1525: 1522: 1516: 1513: 1512: 1511: 1508: 1505: 1503: 1502:Secure coding 1500: 1499: 1498: 1495: 1494: 1492: 1488: 1482: 1479: 1477: 1474: 1472: 1471:SQL injection 1469: 1467: 1464: 1462: 1459: 1457: 1454: 1452: 1451:Vulnerability 1449: 1447: 1444: 1442: 1439: 1437: 1436:Trojan horses 1434: 1432: 1431:Software bugs 1429: 1427: 1424: 1422: 1419: 1417: 1414: 1412: 1409: 1407: 1404: 1402: 1399: 1397: 1394: 1392: 1389: 1387: 1384: 1380: 1377: 1376: 1375: 1372: 1370: 1367: 1365: 1362: 1360: 1357: 1355: 1352: 1350: 1347: 1345: 1342: 1340: 1337: 1335: 1332: 1330: 1327: 1325: 1322: 1320: 1319:Eavesdropping 1317: 1315: 1312: 1310: 1309:Data scraping 1307: 1305: 1302: 1300: 1297: 1295: 1292: 1290: 1287: 1285: 1282: 1280: 1279:Cryptojacking 1277: 1275: 1272: 1270: 1267: 1265: 1262: 1260: 1257: 1255: 1252: 1250: 1247: 1245: 1242: 1238: 1235: 1233: 1230: 1228: 1225: 1223: 1220: 1219: 1217: 1215: 1212: 1210: 1207: 1205: 1202: 1200: 1197: 1196: 1194: 1192: 1188: 1180: 1170: 1167: 1165: 1162: 1160: 1157: 1155: 1152: 1150: 1147: 1145: 1142: 1140: 1137: 1135: 1132: 1130: 1127: 1125: 1122: 1118: 1115: 1113: 1110: 1109: 1108: 1105: 1103: 1100: 1098: 1095: 1094: 1092: 1088: 1084: 1077: 1072: 1070: 1065: 1063: 1058: 1057: 1054: 1047: 1046:Computerworld 1043: 1040: 1037: 1033: 1030: 1027: 1023: 1020: 1017: 1014: 1012: 1008: 1005: 1002: 1001: 989: 983: 975: 971: 967: 963: 956: 949: 945: 941: 935: 928: 924: 919: 917: 902: 898: 891: 885: 884: 879: 873: 857: 851: 843: 839: 832: 824: 822:0-321-50195-0 818: 814: 807: 803: 792: 789: 787: 784: 782: 779: 776: 773: 771: 768: 765: 762: 760: 757: 755: 752: 751: 743: 740: 738: 735: 733: 730: 728: 725: 722: 719: 717: 714: 713: 712: 707:United States 704: 701: 687: 684:that exploit 683: 679: 676: 672: 669: 666: 665: 660: 657: 656: 655: 644: 640: 636: 633: 630: 627: 624: 620: 617: 613: 609: 605: 601: 597: 594: 590: 586: 585: 584: 576: 574: 569: 565: 563: 559: 554: 550: 546: 542: 537: 535: 531: 527: 516: 511: 509: 504: 502: 497: 496: 494: 493: 486: 485: 481: 479: 478: 474: 472: 469: 467: 466: 462: 461: 455: 454: 447: 443: 440: 437: 434: 431: 428: 425: 422: 419: 416: 414: 411: 409: 406: 405: 402: 397: 396: 389: 386: 384: 381: 379: 376: 375: 372: 367: 366: 359: 356: 354: 351: 349: 346: 344: 341: 339: 336: 334: 331: 329: 326: 324: 321: 319: 316: 314: 311: 309: 306: 304: 301: 299: 296: 294: 291: 290: 287: 282: 281: 274: 271: 269: 266: 265: 262: 257: 256: 249: 248:Vulnerability 246: 244: 241: 239: 236: 234: 231: 229: 226: 225: 222: 221:Hacking tools 217: 216: 209: 208:Script kiddie 206: 204: 201: 199: 196: 195: 192: 187: 186: 179: 176: 174: 171: 169: 166: 164: 161: 159: 156: 154: 151: 149: 146: 145: 142: 137: 136: 127: 124: 122: 119: 117: 114: 113: 112: 108: 106: 105:Maker culture 103: 101: 98: 96: 93: 91: 90: 86: 84: 81: 80: 77: 73: 68: 67: 60: 57: 55: 52: 50: 47: 45: 42: 41: 38: 33: 32: 29: 26: 25: 21: 20: 1779: 1749:Trojan horse 1729:Clickjacking 1575:Data masking 1253: 1134:Cyberwarfare 1045: 1035: 1025: 987: 982: 968:(1): 28–38. 965: 961: 955: 934: 926: 922: 904:. Retrieved 900: 890: 881: 872: 860:. Retrieved 850: 844:(11): 28–33. 841: 837: 831: 812: 806: 710: 696: 662: 653: 582: 573:David Jevans 570: 566: 558:confidential 538: 525: 524: 482: 475: 463: 458:Publications 303:Trojan horse 268:HackThisSite 197: 87: 1881:Macro virus 1866:iOS malware 1840:Web threats 1800:Infostealer 1717:Concealment 1515:Misuse case 1349:Infostealer 1324:Email fraud 1289:Data breach 1124:Cybergeddon 862:18 December 612:address bar 608:domain name 600:web browser 591:to collect 471:Hacker News 358:Infostealer 141:Conferences 95:Hackerspace 2009:Cybercrime 1998:Categories 1905:Protection 1820:Ransomware 1785:Fleeceware 1580:Encryption 1456:Web shells 1396:Ransomware 1344:Hacktivism 1107:Cybercrime 906:2020-12-05 901:CSO Online 798:References 643:ransomware 534:cybercrime 328:Logic bomb 323:Ransomware 100:Hacktivism 1830:Scareware 1780:Crimeware 1411:Shellcode 1406:Scareware 1254:Crimeware 1214:Backdoors 673:sent via 623:passwords 526:Crimeware 446:Blue team 438:(defunct) 432:(defunct) 426:(defunct) 420:(defunct) 408:Anonymous 348:Web shell 198:Crimeware 178:Summercon 126:White hat 116:Black hat 109:Types of 83:Hackathon 44:Phreaking 1978:Honeypot 1937:Firewall 1724:Backdoor 1585:Firewall 1490:Defenses 1416:Spamming 1401:Rootkits 1374:Phishing 1334:Exploits 1007:Archived 986:CSI/FBI 944:Archived 781:Phishing 748:See also 693:Concerns 682:exploits 616:pharming 579:Examples 551:through 442:Red team 298:Backdoor 173:ShmooCon 121:Grey hat 1835:Spyware 1744:Rootkit 1673:Malware 1426:Spyware 1369:Payload 1364:Malware 1304:Viruses 1284:Botnets 1191:Threats 925:, Vol. 786:Spyware 754:Malware 723:(HIPAA) 680:Remote 639:decrypt 635:Encrypt 610:in the 541:spyware 530:malware 430:LulzSec 318:Spyware 293:Rootkit 286:Malware 238:Payload 228:Exploit 158:DEF CON 111:hackers 37:History 1810:Malbot 1775:Botnet 1770:Adware 1675:topics 1620:(SIEM) 1597:(HIDS) 1481:Zombie 1218:Bombs 1199:Adware 990:, p.15 819:  621:Steal 545:adware 484:Phrack 401:Groups 333:Botnet 273:Zone-H 1466:Worms 1461:Wiper 1379:Voice 1227:Logic 700:theft 602:to a 308:Virus 76:ethic 1232:Time 1222:Fork 864:2023 817:ISBN 675:SMTP 641:it ( 543:and 343:HIDS 313:Worm 74:and 1237:Zip 1044:, ( 1034:, ( 970:doi 880:", 353:RCE 2000:: 964:. 942:" 927:IX 915:^ 899:. 840:. 645:). 536:. 444:/ 1665:e 1658:t 1651:v 1075:e 1068:t 1061:v 1024:( 976:. 972:: 966:6 938:" 909:. 876:" 866:. 842:4 825:. 618:. 514:e 507:t 500:v

Index

Computer hacking
History
Phreaking
Cryptovirology
Hacking of consumer electronics
List of hackers
Hacker culture
ethic
Hackathon
Hacker Manifesto
Hackerspace
Hacktivism
Maker culture
hackers
Black hat
Grey hat
White hat
Conferences
Black Hat Briefings
Chaos Communication Congress
DEF CON
Hackers on Planet Earth
Security BSides
ShmooCon
Summercon
Computer crime
Crimeware
List of computer criminals
Script kiddie
Hacking tools

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.