Similar Articles |
|
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
InternetNews February 2, 2009 Richard Adhikari |
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. |
PC World August 3, 2002 Andrew Brandt |
Reality Douses DefCon Camaraderie Nation's new security priorities put new risks, greater penalties on cybercrime. |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
BusinessWeek August 22, 2005 Grow & Hamm |
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. |
Wall Street & Technology January 5, 2005 David Tan |
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. |
PC Magazine December 20, 2006 Robert Lemos |
The New Security Threats More secure operating systems mean that attackers are looking elsewhere for holes to sneak through. |
Fast Company Neal Ungerleider |
95% Of Android Phones Could Be Hacked With Just One Text Android users, beware: Security researchers have discovered that 95% of Android phones are vulnerable to attack through the dispatch of just one text message. |
InternetNews February 19, 2008 Sean Michael Kerner |
Black Hat Descends on Washington Hackers flock to D.C. during this week's Black Hat conference to talk government, security and going on the defense - for a change. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
InternetNews July 28, 2010 |
Enterprise Wi-Fi users at Risk? Although Cisco downplays the danger, researchers at the Black Hat security conference discussed a potential security vulnerability in Cisco 1200-series wireless access points. |
InternetNews July 28, 2006 Sean Michael Kerner |
Black Hat 2006: Feeling Insecure in Sin City The people who discover and exploit computer insecurities are at the root of those insecurities. They call them "black hats." This year's Black Hat 2006 Conference promises to be the biggest event in its nearly 10-year history. |
InternetNews August 1, 2007 Sean Michael Kerner |
NSA Honcho Advocates Security Collaboration A National Security Agency official talks what his agency is doing to secure the nation. |
InternetNews July 27, 2005 Tim Gray |
Black Hat Is Back TippingPoint launched Zero Day Initiative, which rewards security researchers for informing the company of any security bugs. |
InternetNews May 30, 2006 Roy Mark |
Symantec Patches Antivirus Vulnerability Symantec said today it has fixed a vulnerability in its antivirus software suite that potentially could open a backdoor to hackers. |
InternetNews July 29, 2010 |
Security Expert Details SAP Back Door Exploit SAP's software is an indispensable part of many enterprise's IT operations, but at the Black Hat security conference, a researcher warns that it is all-too-vulnerable to back-door attacks. |
InternetNews July 27, 2010 |
Security Pros Gather For Black Hat Confab Security experts, hackers and media types are filing into Sin City this week for the annual Black Hat USA security conference, a gathering that's endured and generated its share of controversy in the past. |
InternetNews August 6, 2010 |
Adobe Hurries Patch for PDF Security Flaw The vulnerability in Adobe Reader could give hackers control of a user's computer. |
InternetNews February 26, 2009 Richard Adhikari |
Adobe Patches Flash, But Expect More Problems Adobe's Flash application is great for creating and watching rich multimedia applications, but it's one of the applications security researchers fear most because it is highly vulnerable to hackers. |
InternetNews April 28, 2010 |
Hackers Drawn to Cheap, Simplistic Malware Kits Latest security vendor study finds that do-it-yourself malware kits are popping up everywhere online and bringing even more amateur hackers into the fold. |
Entrepreneur June 2010 Ericka Chickowski |
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. |
T.H.E. Journal February 2009 John K. Waters |
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? |
InternetNews April 2, 2007 Michael Hickins |
Game On: Microsoft to Issue Emergency Patch Microsoft is issuing the patch in advance of its usual Patch Tuesday schedule to counter role-play game hackers. |
InternetNews January 18, 2011 |
Attack Toolkits Spark New Malware Strains Do-it-yourself malware kits are all the rage online and they're making life much easier for cyber-criminals looking to turn a quick buck. |
eCFO December 2000 Karen J. Bannan |
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
InternetNews May 12, 2010 |
Firm Finds Flaws in Popular Antivirus Software Putting the security software offerings from 35 different vendors through their paces, researchers at Matousec conclude that all are susceptible to an exploit that could hobble Windows-based devices. |
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. |
InternetNews July 30, 2010 |
Aruba Taps Cloud to Secure Black Hat Wi-Fi Networking vendor Aruba goes mesh to secure the Black Hat wireless network, pitting its cloud-based security service against a notoriously hostile crowd. |
PC World November 2001 Kim Zetter |
PC Security: Holey Software! New security bugs appear weekly, letting hackers attack your data. Here's why apps are so full of holes and how you can protect yourself... |
InternetNews July 30, 2007 Sean Michael Kerner |
Black Hat Cometh; You Afraid? The Black Hat conference in Las Vegas is a place where bad things are talked about openly and things that we once thought were secure get thrown out the window. |
Bank Systems & Technology July 22, 2007 Nancy Feig |
Bank's IT Security Vulnerability Growing Improvements in overall security have been achieved in most industry sectors, but the financial services industry has seen an increase in the average number of IT vulnerabilities, according to to a study. |
Registered Rep. May 24, 2011 Lauren Barack |
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. |
InternetNews July 30, 2010 |
Researcher Warns of IE Auto-Complete Flaw At the Black Hat security conference, Whitehat Security CTO Jeremiah Grossman describes a browser flaw that could allow hackers to capture entries stored in Web forms. |
InternetNews March 30, 2010 |
Microsoft Says IE's Defenses Not Unbeatable Microsoft touts 'defense in depth' as an effective deterrent after a white hat hacker last week demonstrated a complete takeover of Windows 7 running Internet Explorer 8. |
BusinessWeek August 21, 2006 Steve Hamm |
Heading Off The Hackers Microsoft pulls out the stops to boost security. |
InternetNews April 29, 2011 |
ICANN Names Black Hat as CSO From the blogs: Jeff Moss, founder of Black Hat joins ICANN, but will he be able to make a difference? |
National Defense December 2009 Austin Wright |
National-Security Infrastructure Faces Relentless Cyberespionage Campaign U.S. government and defense-industry networks face a relentless onslaught from cyber-spies who seek some of the nation's most heavily guarded secrets |
InternetNews May 26, 2006 Ed Sutherland |
Symantec Denies 'Highly Severe' Antivirus Flaw Could Symantec's antivirus software, which guards company and government computers, include a backdoor allowing hackers access to corporate data? |
PC Magazine March 16, 2004 Leon Erlanger |
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. |
InternetNews February 24, 2009 Richard Adhikari |
Hackers Pounce on Excel Vulnerability Hackers have launched a new attack that uses a previously undiscovered flaw in Microsoft Excel to target business executives and government agencies. |
InternetNews February 5, 2010 |
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data. |
T.H.E. Journal September 2003 Roger Del Russo |
Securing Your Computer Network Your entire district could be brought to its knees by a hacker's assault, and the costs of reviving the network could be astronomical. While district administrators may have devised plans for securing the physical plant of the school, they rarely consider the vulnerability of their computer networks. |
PC World March 2006 Andrew Sullivan |
Programs in Peril Popular applications have more security flaws than Windows does. |
InternetNews March 19, 2010 |
Google Fixes Its Browser Before Hacker Test Google patches Chrome for eight vulnerabilities that could have left users at risk. The fixes come just as white hat hackers are set to go to town in a vulnerability search contest. |
CIO October 1, 2003 Art Jahnke |
Should Software Vulnerabilities Be Posted Online? Readers weigh in with their opinions on this thorny issue. |
T.H.E. Journal December 2002 Vincent Weafer |
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. |
InternetNews May 1, 2006 David Miller |
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. |
PC Magazine January 18, 2006 Ryan Naraine |
IE Flaw Exposes Google Desktop A design flaw in Internet Explorer could give malicious hackers an easy way to use Google Desktop to hijack user information. |
InternetNews February 18, 2009 Sean Michael Kerner |
Black Hat: Macs Under Attack? A security researcher says a new vulnerability could pose danger to Macs and iPhones. But we're still waiting for the proof. |