MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
August 3, 2007
Sean Michael Kerner
Black Hat And The Jedi Force Hackers have a lot of different tools at their disposal, but low-tech hacking may be all they really need. mark for My Articles similar articles
InternetNews
October 8, 2008
Sean Michael Kerner
Metasploit 3.2 Offers More 'Evil Deeds' Hacking into systems (albeit for testing purposes) is apparently getting easier with the upcoming open source Metasploit 3.2 framework, according to its creator. mark for My Articles similar articles
InternetNews
August 7, 2006
Sean Michael Kerner
Black Hat 2006: 'l33t' or 'Lame?' Was the Black Hat security conference a wake-up call for enterprises or just a snoozer? mark for My Articles similar articles
InternetNews
August 2, 2010
Google Hacking for Enterprise Security: Black Hat At the Black Hat security conference, researchers describe their work expanding on the technique known as Google hacking to leverage the search engine to improve enterprise security. mark for My Articles similar articles
Entrepreneur
December 2005
Amanda C. Kooser
Can You Hack It? Build the best defense you can against hackers. mark for My Articles similar articles
InternetNews
March 27, 2007
Sean Michael Kerner
Speedy Security Exploits with Metasploit 3.0 The revamped open source Metasploit 3.0 framework promises to be faster than ever at leveraging security flaws. mark for My Articles similar articles
InternetNews
February 19, 2008
Sean Michael Kerner
Black Hat Descends on Washington Hackers flock to D.C. during this week's Black Hat conference to talk government, security and going on the defense - for a change. mark for My Articles similar articles
PC World
May 2001
Kim Zetter
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... mark for My Articles similar articles
InternetNews
August 3, 2006
Sean Michael Kerner
Open Source Metasploit Improves Evasion There are few tools freely available to security researchers that are as powerful for developing and testing exploit code as the open source Metasploit Framework. mark for My Articles similar articles
InternetNews
July 29, 2009
Black Hat: Researchers Eye Mac, Oracle Hacks At Black Hat, security researchers shift their attention in honing their penetration testing tools. mark for My Articles similar articles
BusinessWeek
August 22, 2005
Grow & Hamm
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. mark for My Articles similar articles
InternetNews
October 19, 2010
Metasploit Pro Advances Security Testing Rapid7's release of Metasploit Pro includes a new dashboard and customizable reporting engine for security testing. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
PC Magazine
August 23, 2007
John Brandon
Q&A with the Forefather of Hacking Kevin Mitnick, arguably the world's most famous hacker, sets the record straight on what he's doing now, what he didn't do back then, and why kids should not follow in his footsteps. mark for My Articles similar articles
PC World
April 2, 2001
Kim Zetter & Andrew Brandt
How Hackers Hack The tricks hackers use, and what you can do to foil them... mark for My Articles similar articles
InternetNews
June 22, 2006
Sean Michael Kerner
Search Engines And Their Hacker Friends Search engines have become indispensable tools for hundreds of millions of people. Including hackers who are use them to find vulnerable networks, machines and services with relative ease. mark for My Articles similar articles
InternetNews
July 29, 2009
Have You Been Hacked by Metasploit? Find Out! Didn't think it was possible to detect a Metasploit attack? New open source tool will change your mind. mark for My Articles similar articles
CIO
July 14, 2008
Jarina D'Auria
Five Things Kevin Mitnick Has Learned About Computer Security Legendary former hacker on hacking, being hacked, and companies that turn a blind eye to security. mark for My Articles similar articles
PC World
August 3, 2002
Andrew Brandt
Reality Douses DefCon Camaraderie Nation's new security priorities put new risks, greater penalties on cybercrime. mark for My Articles similar articles
InternetNews
May 1, 2006
David Miller
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. mark for My Articles similar articles
PC World
April 10, 2001
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... mark for My Articles similar articles
InternetNews
July 27, 2010
Security Pros Gather For Black Hat Confab Security experts, hackers and media types are filing into Sin City this week for the annual Black Hat USA security conference, a gathering that's endured and generated its share of controversy in the past. mark for My Articles similar articles
Linux Journal
September 2001
Thomas Osterlie
Review: Hacking Linux Exposed Hacking Linux Exposed deals with security-related threats to Linux systems. It's a book for practitioners by practitioners, with an emphasis on practice rather than theory... mark for My Articles similar articles
InternetNews
December 1, 2005
Sean Michael Kerner
Backup Software Under Attack A SANS report on top security vulnerabilities finds that backup and recovery software has become a favorite target of hackers. mark for My Articles similar articles
InternetNews
December 30, 2005
Sean Michael Kerner
Windows 0-Day Exploit Helped by Open Source? Is Metasploit helping to spread the zero day outbreak, or is it helping security professionals to protect against it? The answer depends. mark for My Articles similar articles
Real Estate Portfolio
Mar/Apr 2002
Scott Laliberte
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... mark for My Articles similar articles
InternetNews
July 7, 2010
Hackers Snipe Back in Microsoft Security Row Bruised by Microsoft's criticism dismissing the work of third-party security researchers, a band of hackers has begun a campaign to publish proof-of-concept vulnerabilities in the software giant's products. mark for My Articles similar articles
InternetNews
November 18, 2009
Metasploit Expands Vulnerability Test Framework New release aims to push the boundaries of open source vulnerability testing. mark for My Articles similar articles
Home Theater
April 1, 2010
Mark Fleischmann
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. mark for My Articles similar articles
AskMen.com
Branden Peters
How To: Avoid Getting Hacked Thankfully there are several ways to protect your information and identity from malicious attacks. Some are common sense and others require thought and money. mark for My Articles similar articles
Fast Company
June 2013
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. mark for My Articles similar articles
InternetNews
October 14, 2009
Google Hunts Down Malware "Google Hacking" goes official. mark for My Articles similar articles
New Architect
February 2003
Joseph C. Panettieri
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. mark for My Articles similar articles
Salon.com
June 5, 2002
Andrew Leonard
A new teenage wasteland? Script kiddies, Web site defacers, chat-room gangsters: Today's digital troublemakers get a bad rap. But in "The Hacker Diaries" we learn that they're really all right. mark for My Articles similar articles
InternetNews
July 5, 2006
Sean Michael Kerner
The Month of The Browser Bugs Begins A researcher found another critical hole in IE, but Firefox and Safari aren't safe from attack. mark for My Articles similar articles
BusinessWeek
May 12, 2011
Riley & Vance
Sony: The Company That Kicked the Hornet's Nest Security experts say Sony should have recognized the warning signs of an impending attack, which compromised 100 million accounts. mark for My Articles similar articles
Fast Company
Eric Alt
There's Now A $380,000 Bounty On The Heads Of Ashley Madison Hackers The parent company of AshleyMadison.com -- confirmed through acting Toronto Police Department staff superintendent Bryce Evans that they are offering a cash reward for information leading to the arrest of the hackers who leaked their clients' information. mark for My Articles similar articles
PC Magazine
September 26, 2008
Corinne Iozzio
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). mark for My Articles similar articles
InternetNews
February 18, 2010
Metasploit Moving Into Commercial Mainstream What began as a standalone community project for testing exploits and fixing flaws is gaining traction in the commercial community, as more enterprises are rolling out support for Metasploit. mark for My Articles similar articles
PC Magazine
March 16, 2004
Leon Erlanger
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. mark for My Articles similar articles
InternetNews
March 30, 2010
Microsoft Says IE's Defenses Not Unbeatable Microsoft touts 'defense in depth' as an effective deterrent after a white hat hacker last week demonstrated a complete takeover of Windows 7 running Internet Explorer 8. mark for My Articles similar articles
eCFO
December 2000
Karen J. Bannan
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. mark for My Articles similar articles
InternetNews
July 18, 2006
Sean Michael Kerner
Google Hacking Malicious Code Security researcher H.D. Moore has released a new malware search engine and its underlying code to help searchers find malware code that Google has indexed. mark for My Articles similar articles
Bank Systems & Technology
September 15, 2007
Sharon Gaudin
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. mark for My Articles similar articles
National Defense
March 2014
Stew Magnuson
Defense Companies Facing Array of New Cyberthreats There are new pitfalls out there for defense companies large and small that face a dizzying array of threats against their networks. mark for My Articles similar articles
InternetNews
March 19, 2010
Google Fixes Its Browser Before Hacker Test Google patches Chrome for eight vulnerabilities that could have left users at risk. The fixes come just as white hat hackers are set to go to town in a vulnerability search contest. mark for My Articles similar articles
InternetNews
December 17, 2010
Metasploit 3.5.1 Targets Cisco Networking Gear With its latest update, networking security testbed Metasploit adds features targeting Cisco's networking equipment in a new attack approach exploiting decade-old vulnerabilities. mark for My Articles similar articles
InternetNews
February 1, 2008
Sean Michael Kerner
Metasploit 3.1 Takes Aim at Windows Metasploit moves to new territory in earnest, with its first major update in a year. mark for My Articles similar articles
PC World
December 20, 2001
Matt Berger
Windows Patch Plugs 'Critical' Holes Microsoft issues a fix for a major flaw -- kept secret for five weeks -- that leaves Windows XP, Me, and some 98 systems vulnerable when online... mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles