Similar Articles |
|
Fast Company Rose Pastore |
Hackers Make Good On Threat To Reveal Stolen Ashley Madison Data The hackers said they would post the stolen user data publicly unless Avid Life Media, Ashley Madison's parent company, took the site permanently offline. |
Fast Company Kim Lightbody |
Ashley Madison Earned Millions Through Its "Full Delete" Option As the fallout from the Ashley Madison data dump continues, it now appears that the controversial site made millions in 2014 by charging users to "fully delete" their profiles. |
Fast Company Eric Alt |
There's Now A $380,000 Bounty On The Heads Of Ashley Madison Hackers The parent company of AshleyMadison.com -- confirmed through acting Toronto Police Department staff superintendent Bryce Evans that they are offering a cash reward for information leading to the arrest of the hackers who leaked their clients' information. |
InternetNews June 9, 2009 Alex Goldman |
T-Mobile Hacked? Although a blog reported yesterday that T-Mobile was hacked, all the hackers actually seemed to have was a list of T-Mobile server names. |
InternetNews August 30, 2006 Clint Boulton |
AT&T to Offer Credit Checks After Data Hack AT&T will pay for credit monitoring services after 19,000 credit card numbers were stolen. |
InternetNews March 25, 2010 |
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. |
InternetNews February 4, 2010 |
Firewall Mishap Puts Iowa Workers' Data at Risk More than 80,000 people affiliated with the Hawkeye State's casino and racing industry were victimized by a cyber attack that most likely originated in China. |
BusinessWeek February 10, 2011 Sheelah Kolhatkar |
Cheating, Incorporated At Ashley Madison's website for "dating," the infidelity economy is alive, well, and profitable, but is snubbed by venture capital funders. |
The Motley Fool March 1, 2011 Gary Cassady |
More Hacking From Inside China, Trading Opportunities Is there a way to profit off of the misfortune of cyberattacks? |
CRM September 2012 Kelly Liyakasa |
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
Commercial Investment Real Estate Sep/Oct 2015 Alan Lyons |
Cyber Scares Protect your real estate business from online security breaches. |
PC Magazine September 26, 2008 Corinne Iozzio |
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). |
Investment Advisor March 1, 2011 Lewis Schiff |
Protect Affluent Clients' Data -- and Privacy One mistake can break the trust you've established with hundreds of clients. |
InternetNews April 8, 2010 |
Massive Cyber Spy Ring Seen Operating in China New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official. |
Fast Company Michael Grothaus |
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. |
Fast Company Neal Ungerleider |
China Allegedly Arrested Hackers To Comply With The U.S. Government's Demands Whether China will actually prosecute the hackers is a whole other issue; it's possible the country only made the arrests to skirt the economic sanctions that President Obama was lording over China. |
AskMen.com Bernie Alexander |
Cyber Crime: The Wild West, Online Forget about breaking and entering, aggravated assault and armed robbery. Cyber crime is taking over. |
InternetNews January 28, 2009 Richard Adhikari |
Monster Breach Shows Security Needs Rethinking Is corporate security fighting yesterday's war with last decade's weapons? |
eCFO December 2000 Karen J. Bannan |
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. |
InternetNews April 20, 2010 |
Hackers Breached Google's Password Hub: Report New report cites source close to investigation claiming that hackers in China were able to compromise the password service that acts as gateway to Google's Web products and services. |
CRM October 1, 2005 Marshall Lager |
The Hot Skinny on Hackers What do they know, and how do they find out? A recent "hackers convention" revealed some of their secrets. |
InternetNews July 9, 2010 |
Hackers Raid University of Maine's Servers The social security numbers and other personal data of over 4,500 students were compromised in the attack. |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
InternetNews January 5, 2010 |
Hacker Hits Eastern Washington University Colleges continue to be popular targets for hackers, with another 130,000 student records exposed. |
InternetNews December 16, 2010 |
760,000 Exposed in Ohio State Breach A massive data breach at Ohio State University has current and former students and staff scrambling to check their credit reports. |
Fast Company Daniel Terdiman |
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. |
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
Bank Technology News April 2001 Maria Bruno |
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... |
InternetNews February 25, 2010 |
Intel Confirms Details of Cyber Attack In regulatory filing, Intel outlines "sometimes successful" attacks that infiltrated the company's systems around the same time as the massive attack on Google and other companies. |