Browse Definitions :
Definition

doxing

Contributor(s): Ivy Wigmore

Doxing is the act of gathering information about a target individual or organization and making it public. The term is hacker-speak for documenting. As a rule, the data gathered is sensitive information that the target doesn’t want broadly known, for any of a number of reasons including customer privacy, compliance requirements and reputation management. The information may be gathered from publicly-available sources, through social engineering or through a hacking exploit.

Doxing is sometimes used for a type of extortion in which an attacker accesses the target’s sensitive data and threatens to make it public unless demands – usually for money – are met. Malware known as doxware or extortionware is often used to facilitate the exploit. Doxing is also sometimes used for legitimate purposes, such as aiding law enforcement. Other motives include cyberbullying, industrial espionage and harrassment, as well as the gray area of social and political activism.

The word doxing entered the broader public domain in 2011, when the hacktivist group Anonymous released information about 1500 users of child pornography sites. That same year, Anonymous published information about 7,000 law enforcement personnel in retaliation for investigations into the group’s hacking activities.

This was last updated in January 2017

Continue Reading About doxing

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...

  • Australian Assistance and Access Bill

    The Australian Assistance and Access Bill is legislation introduced and passed in 2018 by the Parliament of Australia to support ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close