MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC Magazine
August 23, 2007
John Brandon
Q&A with the Forefather of Hacking Kevin Mitnick, arguably the world's most famous hacker, sets the record straight on what he's doing now, what he didn't do back then, and why kids should not follow in his footsteps. mark for My Articles similar articles
eCFO
December 2000
Karen J. Bannan
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
PC World
April 10, 2001
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... mark for My Articles similar articles
Entrepreneur
December 2005
Amanda C. Kooser
Can You Hack It? Build the best defense you can against hackers. mark for My Articles similar articles
CIO
June 1, 2001
Tracy Mayor
Break Glass, Pull Handle, Call FBI If you're the victim of a security breach or a virus attack, get the feds on your side... mark for My Articles similar articles
CIO
July 14, 2008
Jarina D'Auria
Five Things Kevin Mitnick Has Learned About Computer Security Legendary former hacker on hacking, being hacked, and companies that turn a blind eye to security. mark for My Articles similar articles
PC Magazine
September 26, 2008
Corinne Iozzio
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). mark for My Articles similar articles
InternetNews
March 30, 2010
IBM to Help Defend FAA From Cyber Attacks IBM will test a new system to monitor and safeguard the FAA's networks against hackers, data theft and malware. mark for My Articles similar articles
BusinessWeek
August 22, 2005
Grow & Hamm
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. mark for My Articles similar articles
Fast Company
June 2013
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. mark for My Articles similar articles
InternetNews
March 30, 2004
Vince Barnes
An Hour with Kevin Mitnick In part one of a candid discussion, former hacker Kevin Mitnick tackles the issue of hiring hackers, talks about his consulting business, book, and expert testimonies on computer hacking and security. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
Unix Insider
May 2000
Carole Fennelly & Brian Martin
Hacker's toolchest What is a hacker's approach to penetration testing? What tools do hackers use? I decided to find out. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
InternetNews
October 9, 2008
Sean Michael Kerner
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. mark for My Articles similar articles
InternetNews
November 11, 2009
DoJ Busts Up Eastern European Hacking Ring Feds indict seven hackers and conspirators responsible for ripping off more than $9 million from an Atlanta-based credit card processing company. mark for My Articles similar articles
T.H.E. Journal
September 2003
Roger Del Russo
Securing Your Computer Network Your entire district could be brought to its knees by a hacker's assault, and the costs of reviving the network could be astronomical. While district administrators may have devised plans for securing the physical plant of the school, they rarely consider the vulnerability of their computer networks. mark for My Articles similar articles
Fast Company
July 2008
Adam L. Penenberg
The Black Market Code Industry Inside the shadowy underworld where rogue employees sell holes in their companies' software. The buyers: security firms, mobsters, and -- surprise -- the U.S. government. mark for My Articles similar articles
Information Today
February 4, 2013
Paula J. Hane
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. mark for My Articles similar articles
Salon.com
June 5, 2002
Andrew Leonard
A new teenage wasteland? Script kiddies, Web site defacers, chat-room gangsters: Today's digital troublemakers get a bad rap. But in "The Hacker Diaries" we learn that they're really all right. mark for My Articles similar articles
Salon.com
August 29, 2001
Damien Cave
How do you fix a leaky Net? Brian West says he was doing a public service when he pointed out a security hole in an Oklahoma newspaper's Web site. So why did the editor in chief call the cops? mark for My Articles similar articles
InternetNews
August 3, 2007
Sean Michael Kerner
Black Hat And The Jedi Force Hackers have a lot of different tools at their disposal, but low-tech hacking may be all they really need. mark for My Articles similar articles
National Defense
August 2012
Eric Beidel
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. mark for My Articles similar articles
Fast Company
Neal Ungerleider
Italian Surveillance Firm Called HackingTeam Gets Hacked An Italian company that sells sophisticated tools for spying on Internet users to the world's most repressive governments appears to have just been the target of a massive hacker attack mark for My Articles similar articles
Registered Rep.
May 24, 2011
Lauren Barack
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. mark for My Articles similar articles
Popular Mechanics
February 2006
Brian Krebs
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. mark for My Articles similar articles
PC World
September 1, 2000
Jeff Sengstack
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. mark for My Articles similar articles
InternetNews
May 11, 2009
Alex Goldman
UC Berkeley Says Hackers Breached Database Officials at the University of California at Berkeley on Friday began notifying students and the public that hackers had breached a healthcare database at the school, potentially gaining access to the personal information of up to 160,000 students dating back to 1999. mark for My Articles similar articles
Bank Technology News
April 2001
Maria Bruno
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
The Motley Fool
June 27, 2011
Tim Beyers
Your Tech Portfolio Has Been Hacked! And that's a good thing. Has the world turned upside down? Hackers who've made headlines for torturing tech companies are turning to honest work. mark for My Articles similar articles
PC World
August 3, 2002
Andrew Brandt
Reality Douses DefCon Camaraderie Nation's new security priorities put new risks, greater penalties on cybercrime. mark for My Articles similar articles
Bank Technology News
February 2010
Michael Sisk
IBM "Frames" Its Approach to Banks After a year of acquisitions, partnerships and innovation, IBM creates the Banking Industry Framework to serve an industry facing historic challenges. mark for My Articles similar articles
InternetNews
September 15, 2005
Tim Gray
Paris Hilton's Hacker Jailed The juvenile accused of making bomb threats and stealing celebrity contact information is sentenced. mark for My Articles similar articles
Salon.com
September 12, 2000
Andrew Leonard
How Big Blue fell for Linux When open-source developers and IBM took gambles on each other, free software showed it can flourish in the heartland of corporate computing. mark for My Articles similar articles
Inc.
August 2005
David H. Freedman
Security Lapse Managers ask the question: Is our data safe? Any honest expert can give you the answer - without knowing a thing about your systems. No, your data is not safe. mark for My Articles similar articles
Popular Mechanics
April 2009
Glenn Derene
How Hackers Could Take Down a Natural Gas Pipeline Much of America's infrastructure is computer-controlled, and therefore subject to hacking. Here is an in-depth look at the specific vulnerabilities of a natural gas pipeline. mark for My Articles similar articles
PC Magazine
March 16, 2004
Leon Erlanger
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. mark for My Articles similar articles
Wired
Steven Levy
Wizzywig Cartoonist Inks a Phreakin' Comic Book Ever since Kevin Mitnick's notorious exploits of the early 1990s, commentary inspired by the dark-side hacker has proliferated. The latest entry is Wizzywig, a four-part graphic novel by Ed Piskor. mark for My Articles similar articles
AskMen.com
Bernie Alexander
Cyber Crime: The Wild West, Online Forget about breaking and entering, aggravated assault and armed robbery. Cyber crime is taking over. mark for My Articles similar articles
InternetNews
May 4, 2009
Alex Goldman
IBM Attacks Oracle With Sun Processor Bounty IBM claims to be the only major open source vendor that's increasing its market share and a new offer aims to accelerate the trend. mark for My Articles similar articles
InternetNews
June 22, 2006
Sean Michael Kerner
Search Engines And Their Hacker Friends Search engines have become indispensable tools for hundreds of millions of people. Including hackers who are use them to find vulnerable networks, machines and services with relative ease. mark for My Articles similar articles