hacktivism
Jul 3, 2020 | CYBERSECURITY

Infographic: Evolution of Hacktivism

[et_pb_section fb_built=”1″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.18.0″ hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″]

The Black Lives Matter movement has increased activity from the hacktivist group, Anonymous, and hacktivism overall. Take a look at the evolution of hacktivism below.

Based on the video by Anonymous posted on twitter, see the video here, the group released cyberattacks on the Minneapolis police department and Minnesota State Senate’s servers.

What is Hacktivism?

The act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists, according to TechTarget.

Hacktivism is typically non-violent, the tactics used are typically to achieve political, social, or religious justice. The tactics they typically use include:

DDoS – Distributed Denial-of-Service, a tactic used to overload systems and crash a website.
Doxxing – used to leak personal, confidential, or incriminating information against organizations or public figures.
Defacement – a tactic used to deface the data integrity of a website by changing the visual appearance.

Ethical Hackers

It may seem strange, but businesses are using ethical hackers to identify weak points in their cyber defenses, provide valuable insights into the actions of their less ethical counterparts and create better, stronger, and more resilient networks.

If you do not think that a hacker could help your business instead of hurting it, you may want to rethink those assumptions. Here are five business benefits ethical hackers can bring to your organization.

Learn more about how Ethical Hackers can help your business. 

Types of Hacktivism

Hacktivists are typically out for justice and not monetary gain like typical hackers. Instead, Panda Security says they their distinct agenda wages an informational war for political lean, social justice, religious intent, or anarchy.

  • Political: Hacktivism as a form of political mobilization aims to lean or sway the population to the hacker’s agenda.
  • Social: Social justice in hacktivism aims to bring about societal change.
  • Religious: Hacktivism for a religious agenda aims to recruit or disavow a religious entity.
  • Anarchist: Hackers can have an anarchist agenda to access or control civil infrastructure, military equipment, or the general population.

Evolution of Hacktivism

[/et_pb_text][et_pb_image src=”https://cybriant.com/wp-content/uploads/2020/07/the-evolution-of-hacktivism_zs5il5-scaled-1.jpg” alt=”evolution of hacktivis” title_text=”the-evolution-of-hacktivism_zs5il5″ url=”https://www.pandasecurity.com/mediacenter/technology/what-is-hacktivism/” _builder_version=”4.16″ global_colors_info=”{}”][/et_pb_image][et_pb_cta title=”Find Out More About PREtect – our All-in-One Cybersecurity Solutions” button_url=”https://cybriant.com/pretect/” button_text=”Learn More” _builder_version=”4.16″ global_colors_info=”{}”][/et_pb_cta][/et_pb_column][/et_pb_row][/et_pb_section]

Cybriant | Bluejacking vs Bluesnarfing: Exploring Bluetooth Hacking Variations.

Enterprise-grade managed security services to fit your mission, needs, and budget.

Let our award-winning team make sure your business is safe.

Shoot us a message to start a discussion about how our team can help you today.

Cybriant | Bluejacking vs Bluesnarfing: Exploring Bluetooth Hacking Variations.
Cybriant | Bluejacking vs Bluesnarfing: Exploring Bluetooth Hacking Variations.

“5 star company to work with”

Jessie M.