MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
CRM
October 1, 2005
Marshall Lager
The Hot Skinny on Hackers What do they know, and how do they find out? A recent "hackers convention" revealed some of their secrets. mark for My Articles similar articles
InternetNews
September 17, 2008
Richard Adhikari
Bill Would Give ID Theft Victims More Weapons A bill containing provisions against cyber criminals that awaits the President's signature. Does it do enough? mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
Home Theater
April 1, 2010
Mark Fleischmann
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. mark for My Articles similar articles
CIO
July 14, 2008
Jarina D'Auria
Five Things Kevin Mitnick Has Learned About Computer Security Legendary former hacker on hacking, being hacked, and companies that turn a blind eye to security. mark for My Articles similar articles
PC World
September 11, 2002
Andrew Brandt
A Year Later, Online Privacy and Security Still Weak Guarding both virtual and physical shores remains a challenge of checks and balances. mark for My Articles similar articles
BusinessWeek
August 22, 2005
Grow & Hamm
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. mark for My Articles similar articles
National Defense
June 2013
Stew Magnuson
Defense Industrial Base Wary of Cybersecurity Laws That hackers are intent on stealing U.S. trade secrets -- particularly those pertaining to the military -- is a given. That the United States is capable of responding to this threat remains to be seen. mark for My Articles similar articles
InternetNews
October 9, 2008
Sean Michael Kerner
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. mark for My Articles similar articles
Salon.com
August 29, 2001
Damien Cave
How do you fix a leaky Net? Brian West says he was doing a public service when he pointed out a security hole in an Oklahoma newspaper's Web site. So why did the editor in chief call the cops? mark for My Articles similar articles
InternetNews
August 3, 2007
Sean Michael Kerner
Black Hat And The Jedi Force Hackers have a lot of different tools at their disposal, but low-tech hacking may be all they really need. mark for My Articles similar articles
CIO
June 1, 2001
Tracy Mayor
Break Glass, Pull Handle, Call FBI If you're the victim of a security breach or a virus attack, get the feds on your side... mark for My Articles similar articles
Fast Company
June 2013
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. mark for My Articles similar articles
Bank Systems & Technology
September 15, 2007
Sharon Gaudin
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. mark for My Articles similar articles
PC World
November 16, 2000
Kim Zetter
Three Minutes With Jennifer Granick, Computer Lawyer Criminal defense attorney assesses antivirus laws, First Amendment rights of coding, and educating young hackers... mark for My Articles similar articles
PC World
November 2002
Andrew Brandt
Privacy Watch: Don't Let Digital Hobos Camp on Your Wireless Network Any individuals running a wireless network -- from administrators in large offices to families -- should expect strangers to try to hop onto their network. Don't wait until your data has been stolen to protect your network. mark for My Articles similar articles
PC World
April 10, 2001
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... mark for My Articles similar articles
eCFO
December 2000
Karen J. Bannan
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
PC World
March 2002
Kim Zetter
Snoopware: New Technologies, Laws Threaten Privacy The FBI's 'Magic Lantern' keystroke logger could help catch terrorists, but at what cost to your fundamental rights? mark for My Articles similar articles
Reason
November 2004
Julian Sanchez
Selling PATRIOT The Department of Justice released "Report from the Field: The USA PATRIOT Act at Work," to help persuade its critics that the PATRIOT Act is both necessary to fight terrorism and unlikely to undermine American liberties. But a close reading of the report suggests the opposite is true. mark for My Articles similar articles
CIO
February 15, 2002
Bill Wall
An Imperfect Cybercrime Treaty The Council of Europe approved the 27th draft of the Convention on Cybercrime, the first international treaty on crime in cyberspace. This may help in prosecuting hackers, but there are some issues that cause concern. mark for My Articles similar articles
CIO
November 1, 2001
Sarah D. Scalet
See You in Court Inadequate security leaves companies open not just to hackers but to lawsuits. Realize why lawsuits over failed information security are imminent. Determine how your company may be liable for damage caused by hackers. Learn how to prepare and respond... mark for My Articles similar articles
PC Magazine
September 26, 2008
Corinne Iozzio
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). mark for My Articles similar articles
CIO
March 15, 2004
Christopher Lindquist
Model Hacker Behavior - Under Development Forget about patches. Researchers at the Florida Institute of Technology are looking for ways to fight hackers by modeling their methods, or "exploits." The research could eventually lead to new types of security tools capable of stopping attacks that hackers haven't even invented yet. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
InternetNews
April 10, 2008
Susan Kuchinskas
Security Here and There Foreign compliance vendors say security trumps privacy in the U.S. mark for My Articles similar articles
Fast Company
December 2000
Astrid Sandoval
VP of Hacker Relations Job Titles of the Future: Even in the free-for-all world of open-source software, you've got to have some order -- and some orderlies, people who serve as intermediaries between the programmers (otherwise known as hackers) and the companies that use their software... mark for My Articles similar articles
InternetNews
December 28, 2010
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. mark for My Articles similar articles
New Architect
February 2003
Joseph C. Panettieri
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. mark for My Articles similar articles
Salon.com
July 20, 2000
Brendan I. Koerner
To heck with hactivism Do politically motivated hackers really think they're promoting global change by defacing Web sites? mark for My Articles similar articles
Bank Technology News
April 2001
Maria Bruno
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... mark for My Articles similar articles
Entrepreneur
December 2005
Amanda C. Kooser
Can You Hack It? Build the best defense you can against hackers. mark for My Articles similar articles
InternetNews
January 15, 2009
Richard Adhikari
Hackers to Take Aim at the Cloud, Virtualization Malware authors and hackers are looking to take advantage of the newest developments in enterprise technology. mark for My Articles similar articles
Wired
January 2007
Robin Mejia
CSI: TCP/IP Keep your friends close and your enemies closer. Why the Pentagon's toughest Internet crime fighter likes hanging out with blackhat hackers. mark for My Articles similar articles
Inc.
August 2005
David H. Freedman
Security Lapse Managers ask the question: Is our data safe? Any honest expert can give you the answer - without knowing a thing about your systems. No, your data is not safe. mark for My Articles similar articles
InternetNews
October 8, 2009
FOCUS 09: McAfee Lays Out Security Battle Plan McAfee CEO Dave DeWalt detailed the vendor's strategy for battling malware, while Colin Powell had a few things to say about hackers. mark for My Articles similar articles
Fast Company
Eric Alt
There's Now A $380,000 Bounty On The Heads Of Ashley Madison Hackers The parent company of AshleyMadison.com -- confirmed through acting Toronto Police Department staff superintendent Bryce Evans that they are offering a cash reward for information leading to the arrest of the hackers who leaked their clients' information. mark for My Articles similar articles
PC Magazine
March 16, 2004
Leon Erlanger
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. mark for My Articles similar articles
The Motley Fool
June 16, 2011
Rich Smith
America Hacked! Hackers are progressing, attacking our government websites with impunity. mark for My Articles similar articles