Similar Articles |
|
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. |
InternetNews February 5, 2010 |
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data. |
InternetNews July 26, 2010 |
Microsoft Updates Bug Reporting Process Extending an olive branch to security researchers, Microsoft says it will provide new mechanisms to make it easier to report vulnerabilities. |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
Bank Systems & Technology September 15, 2007 Sharon Gaudin |
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. |
InternetNews September 21, 2010 |
Microsoft Rushes to Fix Windows Server Flaw Researchers discover a hole in Microsoft's implementation of the Advanced Encryption Standard. |
InternetNews January 14, 2010 |
McAfee Fingers Microsoft IE Flaw in Google Attack McAfee's researchers say 'Operation Aurora' used a zero-day vulnerability in Microsoft's browser software to penetrate Google's networks. |
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
BusinessWeek November 19, 2009 Aaron Ricadela |
Can Adobe Beat Back the Hackers? As its software becomes a major means of attack, security experts wonder if it can fight hard enough |
Registered Rep. May 24, 2011 Lauren Barack |
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
InternetNews April 20, 2010 |
Hackers Breached Google's Password Hub: Report New report cites source close to investigation claiming that hackers in China were able to compromise the password service that acts as gateway to Google's Web products and services. |
InternetNews November 16, 2006 Sean Michael Kerner |
Automated Patching Helping Zero-Day Exploits Latest SANS Institute top 20 list puts IE and Office squarely in hackers cross hairs. Are efforts to protect them fueling the rise? |
Inc. March 2007 |
What We're Worrying About These days, computer security threats are coming from all directions. Here's what is keeping entrepreneurs up at night, according to a recent survey by the research firm Forrester. |
BusinessWeek August 22, 2005 Grow & Hamm |
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. |
Salon.com October 27, 2000 Andrew Leonard |
Who cracked Microsoft? Many free-software hackers make no attempt to hide their hatred of Bill Gates -- could they be the culprits? |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
InternetNews December 28, 2010 |
Security 2010: The Year in Review Stuxnet, embarrassing data leaks and sophisticated phishing attacks dominated the data security landscape in 2010. |
Fast Company December 2000 Astrid Sandoval |
VP of Hacker Relations Job Titles of the Future: Even in the free-for-all world of open-source software, you've got to have some order -- and some orderlies, people who serve as intermediaries between the programmers (otherwise known as hackers) and the companies that use their software... |
InternetNews February 25, 2010 |
Malware Thrives Despite Improved Security: IBM Security researchers at IBM's X-Force find 6,601 new software vulnerabilities in 2009, down 11 percent from last, but that hasn't stopped hackers and phishers from finding new ways to rip off consumers. |
Macworld June 2001 Mel Beckman |
Who's There Firewall Advisor 1.0 Firewall-log analyzer watches your back... |
Fast Company Neal Ungerleider |
95% Of Android Phones Could Be Hacked With Just One Text Android users, beware: Security researchers have discovered that 95% of Android phones are vulnerable to attack through the dispatch of just one text message. |
National Defense August 2012 Eric Beidel |
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. |
InternetNews March 30, 2010 |
Microsoft Says IE's Defenses Not Unbeatable Microsoft touts 'defense in depth' as an effective deterrent after a white hat hacker last week demonstrated a complete takeover of Windows 7 running Internet Explorer 8. |
PC World November 2004 Harry McCracken |
Is This Any Way to Fix Security Holes? How today's software patching process actually helps hackers do their job. |
InternetNews April 2, 2007 Michael Hickins |
Game On: Microsoft to Issue Emergency Patch Microsoft is issuing the patch in advance of its usual Patch Tuesday schedule to counter role-play game hackers. |
InternetNews July 7, 2010 |
Hackers Snipe Back in Microsoft Security Row Bruised by Microsoft's criticism dismissing the work of third-party security researchers, a band of hackers has begun a campaign to publish proof-of-concept vulnerabilities in the software giant's products. |
BusinessWeek August 13, 2009 Joel Schectman |
Computer Hacking Made Easy Botnet attacks like the one that took down Twitter are becoming so easy and cheap, almost anyone can do it. |
InternetNews February 24, 2010 |
Cyber Attacks Hit 75% of Enterprises in 2009 Symantec's latest report has more unsettling news for IT security administrators. |
PC Magazine September 26, 2008 Corinne Iozzio |
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). |
PC World August 3, 2002 Andrew Brandt |
Reality Douses DefCon Camaraderie Nation's new security priorities put new risks, greater penalties on cybercrime. |
InternetNews August 6, 2010 |
Adobe Hurries Patch for PDF Security Flaw The vulnerability in Adobe Reader could give hackers control of a user's computer. |
InternetNews December 13, 2010 |
Data Breach Exposes Wisconsin Students' Data The University of Wisconsin became the latest U.S. college to endure a major data breach this year, putting the personal information of 60,000-plus former students and staff members at risk. |
InternetNews October 13, 2010 |
Latest Scheme Could Unravel Online Identity In an alarming new study, researchers outline the sophisticated new ways that hackers could use pattern analysis and stealth observation to create "rick identity profiles." |
The Motley Fool June 27, 2011 Tim Beyers |
Your Tech Portfolio Has Been Hacked! And that's a good thing. Has the world turned upside down? Hackers who've made headlines for torturing tech companies are turning to honest work. |
Salon.com February 6, 2001 Andrew Leonard |
Hunting the wild hacker Work should be play, says a new book that sets forth the emerging ethical code of free-software programmers... |
InternetNews March 21, 2005 Tim Gray |
California University Computer System Hacked Attackers gain access to private student data. |
BusinessWeek February 25, 2010 |
Breaching the Walls Dealing with cyber-attacks costs companies and governments billions of dollars a year and threatens national and economic security. Here are some recent incidents. |
InternetNews April 8, 2010 |
Massive Cyber Spy Ring Seen Operating in China New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official. |
Fast Company Daniel Terdiman |
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. |
The Motley Fool January 6, 2010 Tim Beyers |
Adobe: Now More Popular Than Microsoft Adobe's technologies could become as much a target for hackers as Microsoft's Office suite, BusinessWeek reports. |
InternetNews March 25, 2010 |
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. |
National Defense March 2015 Stew Magnuson |
Researchers Uncover New Vulnerability For Computers Used in Public Places Security experts are discovering computers and smartphones being used in public places are vulnerable to hackers even if they are not connected to the Internet. |
InternetNews February 4, 2010 |
Firewall Mishap Puts Iowa Workers' Data at Risk More than 80,000 people affiliated with the Hawkeye State's casino and racing industry were victimized by a cyber attack that most likely originated in China. |
CRM October 1, 2005 Marshall Lager |
The Hot Skinny on Hackers What do they know, and how do they find out? A recent "hackers convention" revealed some of their secrets. |
Bank Technology News April 2001 Maria Bruno |
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... |
InternetNews May 18, 2010 |
Microsoft Talks Up Modeling Advancements Company pushes new technical computing initiative aimed at making modeling easier for engineers, analysts and researchers. |
InternetNews October 6, 2006 Ed Sutherland |
Microsoft Plans Nearly Dozen Patches Critical vulnerabilities in Microsoft's Windows operating system and the widely-used Office application suite are part of 11 patches slated to be released next week, according to a Microsoft. |
T.H.E. Journal February 2009 John K. Waters |
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? |
InternetNews January 15, 2009 Richard Adhikari |
Hackers to Take Aim at the Cloud, Virtualization Malware authors and hackers are looking to take advantage of the newest developments in enterprise technology. |