Hacker menu

For years, “black hat” hackers have been able to buy attack kits on the Internet’s black markets. Some offer simple exploits that leverage well-known vulnerabilities. Other contain “zero day” attacks that target gaps for which there are no known defenses.

For years, “black hat” hackers have been able to buy attack kits on the Internet’s black markets. Some offer simple exploits that leverage well-known vulnerabilities. Other contain “zero day” attacks that target gaps for which there are no known defenses.
The Washington Post. Patterson Clark. Published on November 13, 2012, 5:43 p.m.

Related Stories

Health-care sector vulnerable to hackers, researchers say

Health-care sector vulnerable to hackers, researchers say

PART SEVEN | A Post examination of cybersecurity has found that health care is among the most vulnerable industries.

Article: CyberCity allows government hackers to train for attacks

Article: CyberCity allows government hackers to train for attacks

PART SIX | “It might look to some people like a toy or game,” but program prepares government for digital attacks.

Graphic: Practicing for cyberwar

Graphic: Practicing for cyberwar

The Pentagon is building a virtual city that will enable government hackers to practice attacking and defending the computers and networks that increasingly run the world’s water, power and other critical systems. To reinforce the effect of those attacks, the cyber-range, known as “CyberCity,” will include a scale model of buildings and other facilities that will light up when attacks have been successful.

Article: Free hacking tool kits fuel growing cyberspace arms race

Article: Free hacking tool kits fuel growing cyberspace arms race

PART FIVE | Tools make breaking into networks almost as easy for hackers as ordering food off a menu.

Article: Cyberattacks hit targets with human touch

Article: Cyberattacks hit targets with human touch

PART FOUR | The greatest threat to security in the Cyber Age comes from attacks known as “social engineering.”

Article: Tridium issues fixes for online control system

Article: Tridium issues fixes for online control system

Hackers were able to easily breach Niagara Framework, used by more than 300,000 organizations in 52 countries to remotely control a wide array of equipment.

Article: Homeland Security warns of Niagara hack

Article: Homeland Security warns of Niagara hack

The Department of Homeland Security warns about security vulnerabilities in popular software that allows thousands of organizations to link up millions of devices through the Internet.

Article: Software framework illustrates cyber risks

Article: Software framework illustrates cyber risks

PART THREE | The Tridium company’s widely used technology is a marvel of modern connectivity, but after its networks were found to be vulnerable to hackers, it is moving to boost its security.

Graphic: Niagara’s connectivity and risks

Graphic: Niagara’s connectivity and risks

Niagara software has dramatically eased remote control of millions of devices, but the technology also created new vulnerabilities.

Article: Cyber search engine exposes risks

Article: Cyber search engine exposes risks

PART TWO | A new search engine called Shodan finds industrial control systems connected to cyberspace and unsettles the balance of security online.

Graphic: How the Stuxnet worm worked

Graphic: How the Stuxnet worm worked

A cyberattack on Iranian uranium-enrichment centrifuges inspired hackers, who have discovered just how accessible many of the world’s control systems are.

Video: Decoding cyberspace: A new domain of war

Video: Decoding cyberspace: A new domain of war

For global leaders to address risks in the digital universe, they must understand cyberspace.

Article: Vulnerabilities pervade the digital universe

Article: Vulnerabilities pervade the digital universe

PART ONE | To defend themselves, governments, businesses and individuals will need to decipher one of the most complex, man-made environments on Earth: cyberspace.

Timeline: Cyberspace history and attacks

Timeline: Cyberspace history and attacks

Explore some of the technological advances that led to cyberspace, along with notable hacks.

Graphic: ‘Fuzzing’ to find a zero day

Graphic: ‘Fuzzing’ to find a zero day

Consideration of software flaws and hackers is often a secondary priority for software developers, who often value sales and novel applications over security, some critics say.

Cybersecurity poll: Americans divided over government requirements on companies

Cybersecurity poll: Americans divided over government requirements on companies

A Post poll shows limited support for cybersecurity mandates, but there is no broad-based call for government to stay away, even among Republicans.

Q&A: 6 basic questions on cyber security

Q&A: 6 basic questions on cyber security

Q&A | The threat to individuals, companies and nations has grown. Read an overview of the situation.

 
Read what others are saying