Similar Articles |
|
PC Magazine August 23, 2007 John Brandon |
Q&A with the Forefather of Hacking Kevin Mitnick, arguably the world's most famous hacker, sets the record straight on what he's doing now, what he didn't do back then, and why kids should not follow in his footsteps. |
CIO October 1, 2003 Gary Beach |
Beware of the Telephone Most of your employees think hacks originate via a computer. According to Kevin Mitnick, they'd be wrong. Mitnick knows the weakest link in corporate infrastructure security: human beings. |
PC World December 2003 Andrew Brandt |
Privacy Watch: A Latte, a Wi-Fi Link, and a Hacker That person sipping coffee at the next table could be hacking your log-in info as you type. |
InternetNews October 21, 2004 Roy Mark |
Calif. Warns Residents of Possible ID Theft State officials warned California residents Wednesday to take preventative steps against ID theft after an unknown hacker gained access to a database at the University of California, Berkeley. |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
AskMen.com |
The "Nice Hacker" The Frenchman accused of infiltrating Twitter and peeping at the accounts of President Barack Obama and singers Britney Spears and Lily Allen says he wanted to reveal just how vulnerable online data systems are to break-ins -- and he says he didn't mean any harm. |
PC World March 2004 Andrew Brandt |
E@4#N or E@4#W? How to Remember Strong Passwords Tips for creating and keeping track of a passel of passwords. |
InternetNews March 30, 2004 Vince Barnes |
An Hour with Kevin Mitnick In part one of a candid discussion, former hacker Kevin Mitnick tackles the issue of hiring hackers, talks about his consulting business, book, and expert testimonies on computer hacking and security. |
Investment Advisor October 2010 Dan Skiles |
Four Security Best Practices That All Advisors Should Implement Common sense security will make your firm a tough target for hackers. |
PC World April 10, 2001 |
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... |
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
The Motley Fool July 23, 2009 Tim Beyers |
This Mistake Could Ruin Your Financial Life Personal digital security has never been more important. |
CIO October 15, 2002 Daintry Duffy |
The Weakest Link Humans are the weak link in any corporation's carefully crafted security perimeter. That's the prevailing theme of Kevin Mitnick's new book, The Art of Deception: Controlling the Human Element of Security. |
Searcher November 2005 Carol Ebbinghouse |
Another Phine Kettle of Phish: Identity Theft Prevention Ten things to do today to protect yourself against identity theft. |