This chapter explores the risks posed by the increasing prevalence of consumer-grade connected devices, cloud storage, and mobile payment options, which heighten the threat of cyber-attacks for individuals and organizations. It emphasizes the rising need for investment in protecting Intellectual Property (IP) and Personally Identifiable Information (PII) due to cyber breaches. Highlighting the significance of offensive and defensive cyber capabilities in military power dynamics, the chapter examines black hat hacker forums on the Internet and crypto-networks, detailing their structure, content, and behavioral standards, and how these forums facilitate the activities of malicious hackers.
-
Shakarian, Jana, Andrew T. Gunn, and Paulo Shakarian. "Exploring malicious hacker forums." Cyber Deception: Building the Scientific Foundation (2016): 259-282.
-
Members
- JoelR
- Brian
- Como
- IC Essentials
- COSMIN
- Live Games
- Adriano Faria
- Nathan Explosion
- DawPi
- Square Wheels
- Auto Evoke
- YalcinA
- master963
- VAHID
- Chris Anderson
- Myr
- bernhara
- opentype
- ReyDev
- send2yoni
- A Zayed
- terabyte
- Dilip
- ZLTRGO
- adik
- eivindsimensen
- envy
- onlyME
- V0RT3X
- GazzaGarratt
- Analog
- Voyage
- Paul Kaiser
- N700
- Paul
- TracyIsland
- Andy Y
- Omar Barbeytia carretero
- JoeyM
- Ryancoolround
- rainx
- YourSharona
- Kentraiyle Robinson
- MichaelR
- Edward Ellas
- IPS THEME
- aXenDev
- PrettyPixels
- Denis Dyack
- Labis
- DursunKaptan
- MissB
- TheLlamaman
- aLEX49566
- Codepixel
- alsl sndnxnx
- burnyourfeelings
- isvans
- Marius
- Matt
- Thomas Taschler
- Surpac
- JoshB
- Ioannis D
- abobader
- Richard Arch
- bdmusic 24
- Majster87
- TomCat
- Pmw
- Torgeir Rui
- Kammer et
- Nicolas PC
- XwReK
- Claudia999
- Kirill Gromov
- Synergy
- bing11
- Marcin Martyniak
- ArashDev
- ali hagi
- StevenM
- NewVicious
- lukash
- Andhrafriends Admin
- Daffy
- hyprem
- GuitarGathering
- Tripp
- Askancy
- MLK
- Jelly Belly
- eveneme eveneme
- Nomad
- Morphe
- lordi
- shahed
- John Horton
- PayMap
- Serval