Heat, Kelso and the Hacker Mindset
In the 1995 classic Heat, the character Kelso is an old-school hacker with a background as a DARPA scientist who uses his
He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.
In the 1995 classic Heat, the character Kelso is an old-school hacker with a background as a DARPA scientist who uses his
Europol and other agencies disrupted several major malware families, including IcedID, Bymblebess, Trickbot, and Smokeloader in an
Securing AI systems and LLMs seems like a daunting task, but experts say the same principles that apply to software security can
Malicious app developers are using anti-reverse engineering tactics to get around Google Play security restrictions.
The L0pht hacker group testified before the Senate in 1998 and told the lawmakers they could take down the Internet in 30 minutes or less because of a vulnerability in the BGP protocol.
Hacking and disinformation have merged to become the favored methods of political parties, nations, and individual attackers.
Cryptocurrency crime is expanding beyond ransomware to in-browser mining and nation-state attacks.
As the L0pht hacker group matured new members like Mudge and Dildog joined and the group began publishing security advisories on Microsoft Internet Explorer.