Similar Articles |
|
InternetNews July 7, 2010 |
Hackers Snipe Back in Microsoft Security Row Bruised by Microsoft's criticism dismissing the work of third-party security researchers, a band of hackers has begun a campaign to publish proof-of-concept vulnerabilities in the software giant's products. |
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
InternetNews March 30, 2010 |
Microsoft Says IE's Defenses Not Unbeatable Microsoft touts 'defense in depth' as an effective deterrent after a white hat hacker last week demonstrated a complete takeover of Windows 7 running Internet Explorer 8. |
InternetNews March 30, 2004 Ryan Naraine |
Malicious Cisco Code Circulating The release of a hacking toolkit to exploit security holes in Cisco products has sent the networking giant scrambling. |
PC World December 20, 2001 Matt Berger |
Windows Patch Plugs 'Critical' Holes Microsoft issues a fix for a major flaw -- kept secret for five weeks -- that leaves Windows XP, Me, and some 98 systems vulnerable when online... |
InternetNews July 27, 2010 |
Security Pros Gather For Black Hat Confab Security experts, hackers and media types are filing into Sin City this week for the annual Black Hat USA security conference, a gathering that's endured and generated its share of controversy in the past. |
InternetNews July 28, 2005 Tim Gray |
No Restraint at Black Hat Cisco and Internet Security Systems jointly filed a restraining order against the management of the Black Hat Conference and a security expert who gave a presentation claiming attackers can compromise Cisco routers. |
InternetNews November 23, 2009 |
Zero-Day Exploit a Threat to IE6 & 7 Browsers? Another zero-day hole emerges in key Microsoft software. |
CRM October 1, 2005 Marshall Lager |
The Hot Skinny on Hackers What do they know, and how do they find out? A recent "hackers convention" revealed some of their secrets. |
PC World February 21, 2007 Ryan Singel |
Zero-Day Malware Attacks You Can't Block No matter how diligently you patch your PC, it may still be vulnerable during the first hours of a previously unseen attack. Here's what you should know about zero-day hazards and the security holes they exploit. |
eCFO December 2000 Karen J. Bannan |
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. |
InternetNews May 1, 2006 David Miller |
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. |
InternetNews July 27, 2005 Tim Gray |
Black Hat Is Back TippingPoint launched Zero Day Initiative, which rewards security researchers for informing the company of any security bugs. |
PC World March 2006 Andrew Sullivan |
Programs in Peril Popular applications have more security flaws than Windows does. |
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
PC World November 2004 Harry McCracken |
Is This Any Way to Fix Security Holes? How today's software patching process actually helps hackers do their job. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
BusinessWeek August 21, 2006 Steve Hamm |
Heading Off The Hackers Microsoft pulls out the stops to boost security. |
InternetNews February 19, 2008 Sean Michael Kerner |
Black Hat Descends on Washington Hackers flock to D.C. during this week's Black Hat conference to talk government, security and going on the defense - for a change. |
InternetNews August 6, 2010 |
Adobe Hurries Patch for PDF Security Flaw The vulnerability in Adobe Reader could give hackers control of a user's computer. |
InternetNews October 9, 2008 Sean Michael Kerner |
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. |
Wired November 24, 2008 Joshua Davis |
Secret Geek A-Team Hacks Back, Defends Worldwide Web Security specialists have been revamping and strengthening DNS for more than two decades. But buried beneath all this tinkering, Dan Kaminsky had just discovered a vestige of that original helpful and trusting program. |
InternetNews May 22, 2006 Ed Sutherland |
Word Attack Hails From China Security researchers warn Microsoft Word zero-day exploit is aimed at government e-mail systems. |
InternetNews July 28, 2010 |
Enterprise Wi-Fi users at Risk? Although Cisco downplays the danger, researchers at the Black Hat security conference discussed a potential security vulnerability in Cisco 1200-series wireless access points. |
Bank Systems & Technology September 15, 2007 Sharon Gaudin |
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. |
CIO October 1, 2003 Art Jahnke |
Should Software Vulnerabilities Be Posted Online? Readers weigh in with their opinions on this thorny issue. |
InternetNews September 26, 2006 Ed Sutherland |
VML Exploit Subsiding, Questions Remain Microsoft said it is "working non-stop" to develop a fix for a fresh round of attacks exploiting a flaw in the VML portion of Internet Explorer. |
InternetNews May 2, 2007 Michael Hickins |
Mac Hack Contest Draws Fire A Gartner study takes issue with how vulnerabilities are discovered and disclosed. |
InternetNews January 4, 2007 Ed Sutherland |
Vista Exploit Looking For Achilles' Heel First Vista exploit could mean lasting problems for Microsoft, according to a security vendor. |
Fast Company July 2008 Adam L. Penenberg |
The Black Market Code Industry Inside the shadowy underworld where rogue employees sell holes in their companies' software. The buyers: security firms, mobsters, and -- surprise -- the U.S. government. |
National Defense March 2014 Stew Magnuson |
Defense Companies Facing Array of New Cyberthreats There are new pitfalls out there for defense companies large and small that face a dizzying array of threats against their networks. |
InternetNews May 8, 2006 David Miller |
The Surge in Mac Attacks Just as Apple Computer launched a new ad touting OSX's resilience against viruses, the Macintosh operating system and applications have come under fire for harboring serious security flaws. |
InternetNews March 18, 2009 Sean Michael Kerner |
PWN2OWN: What's a Vulnerability Worth? Hacking contest puts cash behind exploiting security holes. But the goal isn't to take advantage of users - it's to help them. |
InternetNews May 17, 2004 Ryan Naraine |
Cisco Investigating Stolen Source Code A corporate network breach leads to leaked proprietary code, but confidential customer data and financial systems weren't compromised. |
BusinessWeek August 13, 2009 Joel Schectman |
Computer Hacking Made Easy Botnet attacks like the one that took down Twitter are becoming so easy and cheap, almost anyone can do it. |
New Architect February 2003 Joseph C. Panettieri |
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. |
InternetNews December 16, 2008 Sean Michael Kerner |
'Shockers' in Cisco's Year-End Security Report But it's what didn't make it into the report that could be even more revealing. |
InternetNews October 6, 2006 Ed Sutherland |
Microsoft Plans Nearly Dozen Patches Critical vulnerabilities in Microsoft's Windows operating system and the widely-used Office application suite are part of 11 patches slated to be released next week, according to a Microsoft. |
Bank Technology News April 2001 Maria Bruno |
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... |
Fast Company June 2013 |
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. |
InternetNews August 1, 2005 Jim Wagner |
Cisco Patches Amidst Uproar The company fixes the software, but its methods to silence the vulnerability before the patch was released has raised eyebrows. |
PC World April 10, 2001 |
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... |
InternetNews July 28, 2006 Sean Michael Kerner |
Black Hat 2006: Feeling Insecure in Sin City The people who discover and exploit computer insecurities are at the root of those insecurities. They call them "black hats." This year's Black Hat 2006 Conference promises to be the biggest event in its nearly 10-year history. |
Salon.com August 29, 2001 Damien Cave |
How do you fix a leaky Net? Brian West says he was doing a public service when he pointed out a security hole in an Oklahoma newspaper's Web site. So why did the editor in chief call the cops? |
T.H.E. Journal February 2009 John K. Waters |
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? |
PC World August 3, 2002 Andrew Brandt |
Reality Douses DefCon Camaraderie Nation's new security priorities put new risks, greater penalties on cybercrime. |
PC Magazine January 18, 2006 Ryan Naraine |
IE Flaw Exposes Google Desktop A design flaw in Internet Explorer could give malicious hackers an easy way to use Google Desktop to hijack user information. |
InternetNews February 21, 2007 Andy Patrizio |
Cisco Issues Security Alert Related to IP Phones Cisco Systems issued an alert on Wednesday that the security of its IP-based phones could be compromised, allowing hackers to get around the security restrictions and change settings or issue a Denial of Service attack. |