361Security
  • Intelligence
    • Blogs >
      • Paul Ashley
      • Brandon Scott >
        • Book
      • Haqmal
    • Analysis
    • Regions >
      • Global
      • Africa >
        • Kenya
        • Nigeria
        • Somalia
      • Asia >
        • Afghanistan
        • Myanmar (Burma)
        • India
        • North Korea
        • Pakistan
      • Europe >
        • Russia
      • Latin America >
        • Brazil
        • Colombia
        • El Salvador
        • Honduras
        • Mexico
        • Venezuela
      • Middle East >
        • Iran
        • Iraq
        • Jordan
        • Kuwait
        • Lebanon
        • Libya
        • Saudi Arabia
        • Syria
        • Turkey
        • Yemen
    • 'The First 300' Project
  • Services
    • US Government Services
    • Jobs Portal >
      • Leads
    • Shop
    • External Links
    • Consulting
    • Human Security
    • Development Nexus
    • Request For Information
    • Market Security
    • Key Leader Dossiers
    • Information Security
    • Literature Reviews
    • Cultural Intelligence
    • Research Resources
    • Forums (Beta)
    • Files
    • Security & Stability
    • Terrorist Profiles
  • Communications
    • About
    • Advertising
    • Public Affairs
    • Contributors >
      • Zachary Alpert
      • Paul Ashley
      • Michael Bassett
      • Ben Eden
      • Jeffrey Hawn
      • Nick Heras
      • Attila Laczko
      • Brandon Scott
      • Chris VanKirk
    • Mailing List

Authorities: Hackers busted when 1 turns informant

3/7/2012

 
NEW YORK - (AP) -- The shadowy underworld of Internet hackers was rocked Tuesday by news that one of the world's most-wanted and most-feared computer vandals has been an FBI informant for months and helped authorities build a case against five people they say were comrades.

Comments are closed.

    Cyber Security

    Never before in history has there been a more complex form of warfare than Cyberwarfare. The cyber battlefield is an ever evolving and seemingly insurmountable obstacle. At 361Security we have dedicated this section to writings from IT professionals from the US and European defense communities. They have volunteered to offer 361 and its readers a professional approach to current and future Cyber threats. Additionally we will provide ample updates to others writings.

    Archives

    May 2012
    March 2012
    February 2012

    Categories

    All

© 2011 - 2025