Similar Articles |
|
Entrepreneur December 2005 Amanda C. Kooser |
Can You Hack It? Build the best defense you can against hackers. |
PC Magazine August 23, 2007 John Brandon |
Q&A with the Forefather of Hacking Kevin Mitnick, arguably the world's most famous hacker, sets the record straight on what he's doing now, what he didn't do back then, and why kids should not follow in his footsteps. |
InternetNews March 30, 2004 Vince Barnes |
An Hour with Kevin Mitnick In part one of a candid discussion, former hacker Kevin Mitnick tackles the issue of hiring hackers, talks about his consulting business, book, and expert testimonies on computer hacking and security. |
New Architect February 2003 Joseph C. Panettieri |
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. |
InternetNews March 29, 2011 |
Is McAfee.com Insecure? Security researchers publicly expose vulnerabilities on McAfee's website. |
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
PC World August 3, 2002 Andrew Brandt |
Reality Douses DefCon Camaraderie Nation's new security priorities put new risks, greater penalties on cybercrime. |
PC World April 10, 2001 |
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... |
InternetNews June 3, 2005 Sean Michael Kerner |
Hackers Hit MSN Korea MSN's popular MSN Korea was knocked offline Thursday after it reportedly discovered that the site had been hacked and apparently booby-trapped in order to pilfer users' passwords. |
The Motley Fool June 16, 2011 Rich Smith |
America Hacked! Hackers are progressing, attacking our government websites with impunity. |
Linux Journal December 1, 2002 Lawrence Rosen |
The Ethical System Administrator As an ethical attorney -- or at least an attorney who strives to be ethical -- I must advise everyone to obey the law. Don't make unauthorized copies of software, and don't just sit idly by when you see others in your company doing so. |
InternetNews October 9, 2008 Sean Michael Kerner |
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. |
InternetNews March 16, 2004 Ryan Naraine |
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. |
Fast Company June 2013 |
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. |
AskMen.com Branden Peters |
How To: Avoid Getting Hacked Thankfully there are several ways to protect your information and identity from malicious attacks. Some are common sense and others require thought and money. |
InternetNews July 7, 2010 |
Hackers Snipe Back in Microsoft Security Row Bruised by Microsoft's criticism dismissing the work of third-party security researchers, a band of hackers has begun a campaign to publish proof-of-concept vulnerabilities in the software giant's products. |
Unix Insider May 2000 Carole Fennelly & Brian Martin |
Hacker's toolchest What is a hacker's approach to penetration testing? What tools do hackers use? I decided to find out. |
InternetNews April 1, 2005 Jim Wagner |
Code Exec Bugs Hit Windows Microsoft's mum on the Windows vulnerabilities since it still hasn't released a patch for them. |
eCFO December 2000 Karen J. Bannan |
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. |
Popular Mechanics January 13, 2010 Glenn Derene |
Why China Needs Google More Than Google Needs China Yesterday Google announced that Gmail accounts of Chinese dissidents had been hacked as part of a broad spying operation apparently tied to the Chinese government. |
Fast Company Chris Gayomali |
Why Do Companies Keep Getting Hacked? "These days, criminal hacking is a business," Patrick Thomas, a security consultant at Neohapsis, tells Fast Company. "Everything that is done has a chain linked to real dollars. And hackers are looking for the shortest chain." |
CIO April 15, 2003 Sarah D. Scalet |
The Pirates Among Us The entertainment industry is battling the illegal distribution of copyrighted music and movie files -- and will stop at nothing to enlist your help. |
InternetNews August 2, 2010 |
Google Hacking for Enterprise Security: Black Hat At the Black Hat security conference, researchers describe their work expanding on the technique known as Google hacking to leverage the search engine to improve enterprise security. |
BusinessWeek August 22, 2005 Grow & Hamm |
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. |