Bill Gardner News Archive

Summary: Our knowledge of online activists or hacktivists is growing, but it is still far from complete. The reasons why some of these individuals violate computer laws or how they justify their behavior remains elusive, yet one particular framework that lends itself to understanding a hacker or hacktivist’s belief system is Sykes and Matza’s (1957)

Summary: This paper explores the use of hacking, leaking, and trolling by Russia to influence the 2016 United States Presidential Elections. These tactics have been called “the weapons of the geek” by some researchers. By using proxy hackers and Russian malware to break into the email of the Democratic National Committee and then giving that

Summary: Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security

Summary: The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization’s staff of the risk and educate them on how to protect your organization’s data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build