Similar Articles |
|
Popular Mechanics June 2007 Joel Johnson |
Hack Attack: Is the Whole Internet at Risk? Some hackers recently tried to take down the entire World Wide Web. You didn't even notice because the Internet is so robust. |
PC World May 23, 2001 Frank Thorsberg |
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... |
The Motley Fool July 13, 2009 Rich Smith |
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
Wired August 23, 2007 John Robb |
When Bots Attack If you want to bring down a country's information infrastructure and you don't want anyone to know who did it, the weapon of choice is a distributed denial of service attack. |
Defense Update Issue 3, 2005 |
DARPA gears to Counter Network Worms One of the most imminent threats to C4 systems, particularly mobile ad-hoc and COTS based networks, are large scale attacks by computer worms spreading malicious code. |
CIO October 30, 2012 Lucian Constantin |
Lack of Abuse Detection Allows Cloud Computing Instances to Be Used Like Botnets, Study Says Some cloud providers don't detect attacks launched from their networks, researchers say |
National Defense February 2006 Stew Magnuson |
Network Vulnerabilities Worry Pentagon Pentagon officials call the Defense Department's global communications network its weakest link. The question is how to manage the risk, and create a balance between security and the necessity of working with international partners and the private sector. |
Popular Mechanics April 2009 Glenn Derene |
How Vulnerable is U.S. Infrastructure to a Major Cyber Attack? The next world war might not start with a bang, but with a blackout. |
PC Magazine August 7, 2009 Lance Ulanoff |
Twitter's Down and It's All Your Fault The micro-blogging service's difficulties are troubling. Why it's suffering through a DDoS attack is even more upsetting. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
InternetNews August 7, 2009 |
Facebook, Twitter Attacks Aimed for One User An anti-Russian blogger with profiles on a number of sites may have been the intended target of yesterday's attack. |
PC World October 23, 2002 Paul Roberts |
Net Attack Could Be First of Many, Experts Warn Future attacks could succeed in bringing down the Internet and are surprisingly simple to launch, security insiders say. |
InternetNews February 2, 2004 Jim Wagner |
SCO Shifts, Microsoft Braces for Next MyDoom Microsoft warns its users on how to remove MyDoom.B from computers as the first DDoS attacks begin. |
Wired August 23, 2007 Ralph Peters |
Washington Ignores Cyberattack Threats, Putting Us All at Peril 21st-century-warfare will be to deny entire states the ability to process, protect, and communicate information. The Pentagon doesn't seem to fully grasp the dangerous potential of this new domain of warfare. |
Popular Mechanics September 2008 Glenn Derene |
The Coming Cyberwar: Inside the Pentagon's Plan to Fight Back In the modern American military, digital telecommunication is so integral to command and control of forces and equipment that the disruption of data can do more to disable a fighting force than a thousand bombs |
Salon.com April 4, 2001 Caroline Benner |
The phantom cyber-threat We should stop worrying about computer terrorism and learn who our real enemies are... |
InternetNews January 27, 2010 |
Is the U.S. Headed for a Cyber War? With cyber threats from abroad coming fast and furious, how serious is the United States about going on the offensive? |
PC World October 22, 2002 Berger & Weil |
Internet Backbone Withstands Attack Monday's denial of service attack called major, but few noticed thanks to Net's redundancies. |
CIO November 1, 2005 Matt Villano |
Seeing No Evil CIOs are growing increasingly frustrated at the laissez-faire attitude of many ISPs toward security. Is it time to consider regulating the ISP industry? |
National Defense April 2007 Stew Magnuson |
Congress Ponders Action After Chinese Anti-Sat Test After the Chinese demonstrated their ability to destroy enemy spacecraft, analysts say U.S. reliance on satellites and make them a weak link in our defenses. |
Fast Company John Paul Titlow |
GitHub Is Still Under The Biggest DDoS Attack In Its History In the biggest DDoS attack in its history, GitHub is facing an onslaught of malicious inbound traffic from what appear to be China-based sources. |
InternetNews December 29, 2005 Roy Mark |
Oregon Man Cops Plea in eBay DDOS Attack A 21-year-old Oregon man faces up to 10 years in prison after pleading guilty this week for his role in launching a distributed denial of service attack on eBay in 2003. |
PC Magazine August 3, 2005 Ryan Naraine |
TCP Port Attack Imminent? An ominous increase in sniffing activity on TCP Port 445 could signal an impending attack targeting a recently patched Microsoft vulnerability. |
InternetNews October 26, 2006 Ed Sutherland |
Zombies Control Half of Windows PCs Software giant Microsoft has crowned the "zombie" PC the greatest threat to Windows users. |
InternetNews February 9, 2004 Sharon Gaudin |
Stripped-Down MyDoom Hits Microsoft.... Again A new variant of the virulent MyDoom worm has been found in the wild, launching what one analyst fears may be a vicious attack against Microsoft Corp.'s Web site. |
National Defense March 2013 Stew Magnuson |
Iran's Ability to Carry Out Attacks in Cyberspace May Be Improving The ability to carry out attacks from across the world that can do real physical or economic damage without ever launching a jet fighter or sending in suicide squads is tempting for adversaries such as Iran, U.S. officials and cybersecurity experts have pointed out. |
CIO February 1, 2002 Scott Berinato |
Cs3 Los Angeles software maker Cs3 likes to look at problems from a different direction -- its MANAnet Reverse Firewall prevents distributed denial-of-service (DDOS) attacks from leaving a network once they enter, helping to stop such assaults from propagating across the Internet... |
The Motley Fool June 13, 2011 Arunava De |
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. |
Wired November 2006 Scott Berinato |
Attack of the Bots The latest threat to the Net: autonomous software programs that combine forces to perpetrate mayhem, fraud, and espionage on a global scale. How one company fought the new Internet mafia - and lost. |
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. |
InternetNews August 6, 2009 |
Twitter, Facebook Hit in Denial-of-Service Attacks Social media phenoms Twitter and Facebook this morning suffered bouts of downtime - with each blaming a denial-of-service (DDoS) attack for its woes. |
InternetNews February 25, 2010 |
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. |
InternetNews December 3, 2004 Tim Gray |
Lycos Europe Pulls Spam-Fighting Screensaver Earlier this week, Lycos Europe launched an aggressive campaign targeting spam-related Web sites. The UK-based company took the offensive when it released a "screensaver that spams the spammers." |
InternetNews March 16, 2004 Ryan Naraine |
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. |
InternetNews July 14, 2009 |
Inside Korea's Cyber Attack What really happened in South Korea? Attackers used the country's high-speed network against itself. |
PC Magazine February 15, 2006 Matthew D. Sarrel |
Business Body Armor All sorts of enemy combatants want to penetrate your network, but you can turn attacks aside with the right combo of hardware and tactics. |
InternetNews June 25, 2004 Ryan Naraine |
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users. |
InternetNews November 29, 2004 Jim Wagner |
SCO Site Cracked The homepage for the SCO Group's Web site is back to normal Monday after attackers defaced images on the site. |
InternetNews July 8, 2009 Alex Goldman |
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. |
InternetNews January 29, 2007 Michael Hickins |
Microsoft Warns of New Zero-Day Flaw Microsoft is investigating new public reports of limited "zero-day" attacks using a vulnerability in Microsoft Word 2000. |
PC World August 21, 2007 Robert McMillan |
Is the U.S. at Risk From Cyberwarfare? Hostile governments may be behind the next wave of Internet attacks. |
InternetNews January 16, 2004 Jim Wagner |
Cyberspace, The Next Battlefield Is World Cyber War I somewhere on the horizon? A new report shows the increased popularity of converged networks like VoIP makes it more likely. |
InternetNews October 25, 2006 Roy Mark |
Floridian Charged in Akamai Attack A 32-year-old Floridian faces charges in Massachusetts for his alleged role in launching a distributed denial of service attack on Akamai Technologies. |
Information Today December 5, 2013 |
Internet Security Providers Team Up Akamai, a cloud-based security platform, announced its acquisition of Prolexic Technologies, a provider of cloud-based security solutions for distributed denial of service attacks. |
Popular Mechanics April 2009 Glenn Derene |
How Hackers Could Take Down a Natural Gas Pipeline Much of America's infrastructure is computer-controlled, and therefore subject to hacking. Here is an in-depth look at the specific vulnerabilities of a natural gas pipeline. |
Bank Technology News July 2008 Rebecca Sausner |
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. |
PC Magazine June 23, 2008 Matthew D. Sarrel |
How Secure Is Your Company? To protect your business, think like a thief. |
Bank Technology News January 2011 Rebecca Sausner |
New Year, New Hacks? The new year is likely to bring more of the same when it comes to criminals siphoning funds from consumers and banks. |
InternetNews June 1, 2004 Colin C. Haley |
AT&T on DoS: Early Detection Equals Prevention The carrier introduces a new service to thwart denial-of-service attacks on corporate systems. |