Similar Articles |
|
InternetNews October 9, 2008 Sean Michael Kerner |
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. |
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
InternetNews February 18, 2009 Sean Michael Kerner |
Black Hat: Macs Under Attack? A security researcher says a new vulnerability could pose danger to Macs and iPhones. But we're still waiting for the proof. |
InternetNews June 22, 2006 Sean Michael Kerner |
Search Engines And Their Hacker Friends Search engines have become indispensable tools for hundreds of millions of people. Including hackers who are use them to find vulnerable networks, machines and services with relative ease. |
InternetNews March 30, 2010 |
Microsoft Says IE's Defenses Not Unbeatable Microsoft touts 'defense in depth' as an effective deterrent after a white hat hacker last week demonstrated a complete takeover of Windows 7 running Internet Explorer 8. |
Entrepreneur December 2005 Amanda C. Kooser |
Can You Hack It? Build the best defense you can against hackers. |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
BusinessWeek August 22, 2005 Grow & Hamm |
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. |
PC World August 3, 2002 Andrew Brandt |
Reality Douses DefCon Camaraderie Nation's new security priorities put new risks, greater penalties on cybercrime. |
InternetNews August 7, 2006 Sean Michael Kerner |
Black Hat 2006: 'l33t' or 'Lame?' Was the Black Hat security conference a wake-up call for enterprises or just a snoozer? |
CRM October 1, 2005 Marshall Lager |
The Hot Skinny on Hackers What do they know, and how do they find out? A recent "hackers convention" revealed some of their secrets. |
InternetNews August 2, 2010 |
Google Hacking for Enterprise Security: Black Hat At the Black Hat security conference, researchers describe their work expanding on the technique known as Google hacking to leverage the search engine to improve enterprise security. |
PC World April 10, 2001 |
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... |
Bank Systems & Technology September 15, 2007 Sharon Gaudin |
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. |
InternetNews October 5, 2007 Sean Michael Kerner |
Fuzzing at 18: Still Crude, Still Effective Throw garbage at an application and what happens? In plenty of cases it'll crash. That method of attack is becoming increasingly popular as a critical component for security researchers and application developers. |
PC Magazine August 23, 2007 John Brandon |
Q&A with the Forefather of Hacking Kevin Mitnick, arguably the world's most famous hacker, sets the record straight on what he's doing now, what he didn't do back then, and why kids should not follow in his footsteps. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
PC Magazine September 26, 2008 Corinne Iozzio |
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). |
New Architect February 2003 Joseph C. Panettieri |
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. |
Salon.com June 5, 2002 Andrew Leonard |
A new teenage wasteland? Script kiddies, Web site defacers, chat-room gangsters: Today's digital troublemakers get a bad rap. But in "The Hacker Diaries" we learn that they're really all right. |
PC Magazine June 20, 2008 Larry Seltzer |
Hacked Through the Heart Even medical gadgetry is subject to outside hacking. |
Fast Company June 2013 |
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. |
eCFO December 2000 Karen J. Bannan |
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. |
InternetNews August 3, 2007 Sean Michael Kerner |
How The iPhone Was Cracked The Mac OS may be far less secure than most think it is. |
InternetNews March 16, 2004 Ryan Naraine |
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. |
InternetNews July 30, 2007 Sean Michael Kerner |
Will Mozilla's Fuzzer Break The Web? Mozilla will explain to an audience at the annual Black Hat show in Las Vegas how to break the browser using tools that Mozilla has developed and is expected to release. |