MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC Magazine
August 23, 2007
John Brandon
Q&A with the Forefather of Hacking Kevin Mitnick, arguably the world's most famous hacker, sets the record straight on what he's doing now, what he didn't do back then, and why kids should not follow in his footsteps. mark for My Articles similar articles
CIO
October 1, 2003
Gary Beach
Beware of the Telephone Most of your employees think hacks originate via a computer. According to Kevin Mitnick, they'd be wrong. Mitnick knows the weakest link in corporate infrastructure security: human beings. mark for My Articles similar articles
PC World
December 2003
Andrew Brandt
Privacy Watch: A Latte, a Wi-Fi Link, and a Hacker That person sipping coffee at the next table could be hacking your log-in info as you type. mark for My Articles similar articles
InternetNews
October 21, 2004
Roy Mark
Calif. Warns Residents of Possible ID Theft State officials warned California residents Wednesday to take preventative steps against ID theft after an unknown hacker gained access to a database at the University of California, Berkeley. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
AskMen.com The "Nice Hacker" The Frenchman accused of infiltrating Twitter and peeping at the accounts of President Barack Obama and singers Britney Spears and Lily Allen says he wanted to reveal just how vulnerable online data systems are to break-ins -- and he says he didn't mean any harm. mark for My Articles similar articles
PC World
March 2004
Andrew Brandt
E@4#N or E@4#W? How to Remember Strong Passwords Tips for creating and keeping track of a passel of passwords. mark for My Articles similar articles
InternetNews
March 30, 2004
Vince Barnes
An Hour with Kevin Mitnick In part one of a candid discussion, former hacker Kevin Mitnick tackles the issue of hiring hackers, talks about his consulting business, book, and expert testimonies on computer hacking and security. mark for My Articles similar articles
Investment Advisor
October 2010
Dan Skiles
Four Security Best Practices That All Advisors Should Implement Common sense security will make your firm a tough target for hackers. mark for My Articles similar articles
PC World
April 10, 2001
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
The Motley Fool
July 23, 2009
Tim Beyers
This Mistake Could Ruin Your Financial Life Personal digital security has never been more important. mark for My Articles similar articles
CIO
October 15, 2002
Daintry Duffy
The Weakest Link Humans are the weak link in any corporation's carefully crafted security perimeter. That's the prevailing theme of Kevin Mitnick's new book, The Art of Deception: Controlling the Human Element of Security. mark for My Articles similar articles
Searcher
November 2005
Carol Ebbinghouse
Another Phine Kettle of Phish: Identity Theft Prevention Ten things to do today to protect yourself against identity theft. mark for My Articles similar articles