Similar Articles |
|
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
CRM October 1, 2005 Marshall Lager |
The Hot Skinny on Hackers What do they know, and how do they find out? A recent "hackers convention" revealed some of their secrets. |
InternetNews September 17, 2008 Richard Adhikari |
Bill Would Give ID Theft Victims More Weapons A bill containing provisions against cyber criminals that awaits the President's signature. Does it do enough? |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. |
CIO July 14, 2008 Jarina D'Auria |
Five Things Kevin Mitnick Has Learned About Computer Security Legendary former hacker on hacking, being hacked, and companies that turn a blind eye to security. |
PC World September 11, 2002 Andrew Brandt |
A Year Later, Online Privacy and Security Still Weak Guarding both virtual and physical shores remains a challenge of checks and balances. |
BusinessWeek August 22, 2005 Grow & Hamm |
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. |
National Defense June 2013 Stew Magnuson |
Defense Industrial Base Wary of Cybersecurity Laws That hackers are intent on stealing U.S. trade secrets -- particularly those pertaining to the military -- is a given. That the United States is capable of responding to this threat remains to be seen. |
InternetNews October 9, 2008 Sean Michael Kerner |
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. |
Salon.com August 29, 2001 Damien Cave |
How do you fix a leaky Net? Brian West says he was doing a public service when he pointed out a security hole in an Oklahoma newspaper's Web site. So why did the editor in chief call the cops? |
InternetNews August 3, 2007 Sean Michael Kerner |
Black Hat And The Jedi Force Hackers have a lot of different tools at their disposal, but low-tech hacking may be all they really need. |
CIO June 1, 2001 Tracy Mayor |
Break Glass, Pull Handle, Call FBI If you're the victim of a security breach or a virus attack, get the feds on your side... |
Fast Company June 2013 |
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. |
Bank Systems & Technology September 15, 2007 Sharon Gaudin |
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. |
PC World November 16, 2000 Kim Zetter |
Three Minutes With Jennifer Granick, Computer Lawyer Criminal defense attorney assesses antivirus laws, First Amendment rights of coding, and educating young hackers... |
PC World November 2002 Andrew Brandt |
Privacy Watch: Don't Let Digital Hobos Camp on Your Wireless Network Any individuals running a wireless network -- from administrators in large offices to families -- should expect strangers to try to hop onto their network. Don't wait until your data has been stolen to protect your network. |
PC World April 10, 2001 |
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... |
eCFO December 2000 Karen J. Bannan |
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
PC World March 2002 Kim Zetter |
Snoopware: New Technologies, Laws Threaten Privacy The FBI's 'Magic Lantern' keystroke logger could help catch terrorists, but at what cost to your fundamental rights? |
Reason November 2004 Julian Sanchez |
Selling PATRIOT The Department of Justice released "Report from the Field: The USA PATRIOT Act at Work," to help persuade its critics that the PATRIOT Act is both necessary to fight terrorism and unlikely to undermine American liberties. But a close reading of the report suggests the opposite is true. |
CIO February 15, 2002 Bill Wall |
An Imperfect Cybercrime Treaty The Council of Europe approved the 27th draft of the Convention on Cybercrime, the first international treaty on crime in cyberspace. This may help in prosecuting hackers, but there are some issues that cause concern. |
CIO November 1, 2001 Sarah D. Scalet |
See You in Court Inadequate security leaves companies open not just to hackers but to lawsuits. Realize why lawsuits over failed information security are imminent. Determine how your company may be liable for damage caused by hackers. Learn how to prepare and respond... |
PC Magazine September 26, 2008 Corinne Iozzio |
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). |
CIO March 15, 2004 Christopher Lindquist |
Model Hacker Behavior - Under Development Forget about patches. Researchers at the Florida Institute of Technology are looking for ways to fight hackers by modeling their methods, or "exploits." The research could eventually lead to new types of security tools capable of stopping attacks that hackers haven't even invented yet. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
InternetNews April 10, 2008 Susan Kuchinskas |
Security Here and There Foreign compliance vendors say security trumps privacy in the U.S. |
Fast Company December 2000 Astrid Sandoval |
VP of Hacker Relations Job Titles of the Future: Even in the free-for-all world of open-source software, you've got to have some order -- and some orderlies, people who serve as intermediaries between the programmers (otherwise known as hackers) and the companies that use their software... |
InternetNews December 28, 2010 |
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. |
New Architect February 2003 Joseph C. Panettieri |
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. |
Salon.com July 20, 2000 Brendan I. Koerner |
To heck with hactivism Do politically motivated hackers really think they're promoting global change by defacing Web sites? |
Bank Technology News April 2001 Maria Bruno |
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... |
Entrepreneur December 2005 Amanda C. Kooser |
Can You Hack It? Build the best defense you can against hackers. |
InternetNews January 15, 2009 Richard Adhikari |
Hackers to Take Aim at the Cloud, Virtualization Malware authors and hackers are looking to take advantage of the newest developments in enterprise technology. |
Wired January 2007 Robin Mejia |
CSI: TCP/IP Keep your friends close and your enemies closer. Why the Pentagon's toughest Internet crime fighter likes hanging out with blackhat hackers. |
Inc. August 2005 David H. Freedman |
Security Lapse Managers ask the question: Is our data safe? Any honest expert can give you the answer - without knowing a thing about your systems. No, your data is not safe. |
InternetNews October 8, 2009 |
FOCUS 09: McAfee Lays Out Security Battle Plan McAfee CEO Dave DeWalt detailed the vendor's strategy for battling malware, while Colin Powell had a few things to say about hackers. |
Fast Company Eric Alt |
There's Now A $380,000 Bounty On The Heads Of Ashley Madison Hackers The parent company of AshleyMadison.com -- confirmed through acting Toronto Police Department staff superintendent Bryce Evans that they are offering a cash reward for information leading to the arrest of the hackers who leaked their clients' information. |
PC Magazine March 16, 2004 Leon Erlanger |
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. |
The Motley Fool June 16, 2011 Rich Smith |
America Hacked! Hackers are progressing, attacking our government websites with impunity. |