Similar Articles |
|
InternetNews May 18, 2007 Sean Michael Kerner |
Estonia Under Russian Cyber Attack? Data by a security research firm clearly shows that a full-scale assault is under way, but the attackers' identity and location is still uncertain. |
National Defense October 2007 Breanne Wagner |
Cyber Attacks in Estonia Serve as Wake-Up Call The attacks compromised both public and private websites and sent a wave of panic through a country that is known for being especially "wired." |
PC World May 23, 2001 Frank Thorsberg |
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... |
InternetNews July 8, 2009 Alex Goldman |
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. |
PC World August 21, 2007 Robert McMillan |
Is the U.S. at Risk From Cyberwarfare? Hostile governments may be behind the next wave of Internet attacks. |
The Motley Fool June 13, 2011 Arunava De |
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. |
PC World October 23, 2002 Paul Roberts |
Net Attack Could Be First of Many, Experts Warn Future attacks could succeed in bringing down the Internet and are surprisingly simple to launch, security insiders say. |
InternetNews November 29, 2007 |
World Faces 'Cyber Cold War' Threat Cybercrime is no longer just a threat to industry and individuals but increasingly to national security. |
InternetNews August 6, 2009 |
Twitter, Facebook Hit in Denial-of-Service Attacks Social media phenoms Twitter and Facebook this morning suffered bouts of downtime - with each blaming a denial-of-service (DDoS) attack for its woes. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
PC Magazine June 20, 2008 Larry Seltzer |
Hacked Through the Heart Even medical gadgetry is subject to outside hacking. |
InternetNews March 28, 2005 Tim Gray |
Alliance Formed to Finger Hackers The Fingerprint Sharing Alliance, an initiative comprised of global communications service providers, attempts to decrease the number of Internet attacks. |
The Motley Fool July 13, 2009 Rich Smith |
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. |
InternetNews February 25, 2010 |
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. |
InternetNews August 4, 2009 |
Cyber War Could Cause Global Collateral Damage The effects of an all-out cyber war would be impossible to control and could be felt worldwide, experts say. |
InternetNews April 29, 2005 Michael Singer |
Paul Kocher, President, Cryptography Research The man who designed SSL v3.0 talks about the latest security threats on the horizon and how cryptography can help solve them. |
InternetNews October 25, 2006 Roy Mark |
Floridian Charged in Akamai Attack A 32-year-old Floridian faces charges in Massachusetts for his alleged role in launching a distributed denial of service attack on Akamai Technologies. |
Bank Technology News May 2006 Holly Sraeel |
If Financial Crime is Rising, Then Security is Job #1 Furthered along by a loosely knit network of criminals, cybercrime is being waged by hackers and botmasters for profit in ways that are often not easily tracked by financial institutions, law enforcement authorities and governments. |
Science News April 25, 2009 |
Science Past From The Issue Of April 25, 1959 There appears to be a strong link between the behavior of a man with regard to his business and social activities and his chances of being a victim of a heart attack. |
IEEE Spectrum April 2006 Prachi Patel-Predd |
Cybercrime At A Glance But just how much damage can cybercrime cause? About $67 billion to U.S. companies last year, according to an estimate based on the Federal Bureau of Investigation's 2005 Computer Crime Survey. Here's more statistics. |
Chemistry World June 10, 2015 Emma Stoye |
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. |
InternetNews July 14, 2009 |
Inside Korea's Cyber Attack What really happened in South Korea? Attackers used the country's high-speed network against itself. |
American Family Physician February 15, 2005 |
Panic Attacks A patient bulletin describing the disorder and how to find help with treatment and diagnosis. |
InternetNews August 7, 2009 |
Facebook, Twitter Attacks Aimed for One User An anti-Russian blogger with profiles on a number of sites may have been the intended target of yesterday's attack. |
PC Magazine June 20, 2007 Larry Seltzer |
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. |
CIO February 15, 2002 Abbie Lundberg |
Response Ability How do you respond to a computer security incident? |
InternetNews January 29, 2007 Michael Hickins |
Microsoft Warns of New Zero-Day Flaw Microsoft is investigating new public reports of limited "zero-day" attacks using a vulnerability in Microsoft Word 2000. |
PC World October 22, 2002 Berger & Weil |
Internet Backbone Withstands Attack Monday's denial of service attack called major, but few noticed thanks to Net's redundancies. |
Wired August 23, 2007 John Robb |
When Bots Attack If you want to bring down a country's information infrastructure and you don't want anyone to know who did it, the weapon of choice is a distributed denial of service attack. |
InternetNews January 19, 2011 |
New Type of Denial of Service Attack Emerging Researchers detail a new kind of more sophisticated DoS attack at this week's Black Hat security conference. |
InternetNews April 27, 2011 |
Russia Leads in Internet Attack Traffic New report from Akamai names Russia as the source of 10 percent of global attack traffic, but is it all really coming from Russia? |
InternetNews October 31, 2007 Andy Patrizio |
Symantec's Latest: Customized Threat Protection Symantec announced a custom threat analysis and protection service through its Global Services Security Response unit. Managed Threat Analysis, is designed to help companies facing more targeted attacks from criminals looking to steal intellectual property. |
RootPrompt.org April 3, 2000 Fernando Schapachnik |
Defeating DDOS II A proposal for defeating Distributed Denial of Service Attacks based on changing network routes... |
InternetNews March 25, 2005 Sean Michael Kerner |
Phishers Target Yahoo Messenger A new attack has been launched against Yahoo Messenger users, and it could be a sign of things to come. |
Wall Street & Technology January 5, 2007 Larry Tabb |
Preparing for the Inevitable While electronic thefts can be cleaner, less physical and certainly less bloody, the chance of getting money out of a brokerage or bank illegally is usually greater with a gun than a computer. But as the criminals and terrorists get smarter, we too must raise the bar. |
AskMen.com January 21, 2002 Joshua Levine |
Dealing With Anxiety Attacks If you or anybody you know has ever had the urge to freeze, gasp or run away in terror over the most trivial of things, now you will finally understand the causes of and treatments for anxiety attacks... |
National Defense November 2013 Yasmin Tadjdeh |
Al-Qaida Seen Shifting Tactics to Smaller Attacks The Boston bombing quickly brought domestic jihadist terrorism back into the public eye. Counterterrorism analysts are now concerned that the United States may soon face an increase in deadly, smaller scale attacks. |
PC World February 3, 2003 Paul Roberts |
The Net Is Dangerous, Research Says Attack rates decline, but worms and software flaws keep cyberspace hazardous, Symantec reports. |
Fast Company Michael Grothaus |
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. |
InternetNews January 15, 2010 David Needle |
VeriSign Ties Google Attack to China Government Security firm cite sources claiming hackers acted on official authority from Chinese government. |
InternetNews May 10, 2011 |
DDoS Attacks Hit the Bottom Line According to VeriSign, DDoS attacks have gone mainstream with 63 percent of survey respondents getting hit at least once and 11 percent getting attacked more than six times. |
IEEE Spectrum August 2012 Willie D. Jones |
Declarations of Cyberwar What the revelations about the U.S.-Israeli origin of Stuxnet mean for warfare |
InternetNews December 29, 2005 Roy Mark |
Oregon Man Cops Plea in eBay DDOS Attack A 21-year-old Oregon man faces up to 10 years in prison after pleading guilty this week for his role in launching a distributed denial of service attack on eBay in 2003. |
New Architect May 2002 Jay Lyman |
to Catch a Thief Effective incident response against network intruders... |
Wired August 21, 2007 Joshua Davis |
Hackers Take Down the Most Wired Country in Europe How Estonia dealt with a botnet strike that targeted almost every digital front all at once. |
InternetNews January 27, 2011 |
British Cops Snag 5 Pro-Wikileaks Hackers Scotland Yard authorities announce arrest of five members of "Anonymous" hacking ring charged with marshaling DDoS attacks against firms that cut off payments service to Wikileaks. |
InternetNews October 27, 2010 |
Malware Scams Pick Up In Retail Sector Targeted attacks are becoming more and more common as hackers seek out specific individuals or groups to steal proprietary information. |
National Defense June 2009 Stew Magnuson |
U.S. Plans to Destroy Enemy Computer Networks in Cyber-Attacks Questioned But secrecy may have impeded widespread debate about the nature and implications of cyber-attack. |
CIO February 1, 2003 Scott Berinato |
Threats Won't Make the Sky Fall CIOs and other IT executives would be wise to remain focused on what a specific threat means to their organization so that they can address any vulnerabilities that may exist. You don't need to hear the words of a terror threat to sustain such a focus. |
National Defense March 2013 Stew Magnuson |
Iran's Ability to Carry Out Attacks in Cyberspace May Be Improving The ability to carry out attacks from across the world that can do real physical or economic damage without ever launching a jet fighter or sending in suicide squads is tempting for adversaries such as Iran, U.S. officials and cybersecurity experts have pointed out. |