Similar Articles |
|
InternetNews August 3, 2007 Sean Michael Kerner |
Black Hat And The Jedi Force Hackers have a lot of different tools at their disposal, but low-tech hacking may be all they really need. |
InternetNews October 8, 2008 Sean Michael Kerner |
Metasploit 3.2 Offers More 'Evil Deeds' Hacking into systems (albeit for testing purposes) is apparently getting easier with the upcoming open source Metasploit 3.2 framework, according to its creator. |
InternetNews August 7, 2006 Sean Michael Kerner |
Black Hat 2006: 'l33t' or 'Lame?' Was the Black Hat security conference a wake-up call for enterprises or just a snoozer? |
InternetNews August 2, 2010 |
Google Hacking for Enterprise Security: Black Hat At the Black Hat security conference, researchers describe their work expanding on the technique known as Google hacking to leverage the search engine to improve enterprise security. |
Entrepreneur December 2005 Amanda C. Kooser |
Can You Hack It? Build the best defense you can against hackers. |
InternetNews March 27, 2007 Sean Michael Kerner |
Speedy Security Exploits with Metasploit 3.0 The revamped open source Metasploit 3.0 framework promises to be faster than ever at leveraging security flaws. |
InternetNews February 19, 2008 Sean Michael Kerner |
Black Hat Descends on Washington Hackers flock to D.C. during this week's Black Hat conference to talk government, security and going on the defense - for a change. |
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
InternetNews August 3, 2006 Sean Michael Kerner |
Open Source Metasploit Improves Evasion There are few tools freely available to security researchers that are as powerful for developing and testing exploit code as the open source Metasploit Framework. |
InternetNews July 29, 2009 |
Black Hat: Researchers Eye Mac, Oracle Hacks At Black Hat, security researchers shift their attention in honing their penetration testing tools. |
BusinessWeek August 22, 2005 Grow & Hamm |
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. |
InternetNews October 19, 2010 |
Metasploit Pro Advances Security Testing Rapid7's release of Metasploit Pro includes a new dashboard and customizable reporting engine for security testing. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
PC Magazine August 23, 2007 John Brandon |
Q&A with the Forefather of Hacking Kevin Mitnick, arguably the world's most famous hacker, sets the record straight on what he's doing now, what he didn't do back then, and why kids should not follow in his footsteps. |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
InternetNews June 22, 2006 Sean Michael Kerner |
Search Engines And Their Hacker Friends Search engines have become indispensable tools for hundreds of millions of people. Including hackers who are use them to find vulnerable networks, machines and services with relative ease. |
InternetNews July 29, 2009 |
Have You Been Hacked by Metasploit? Find Out! Didn't think it was possible to detect a Metasploit attack? New open source tool will change your mind. |
CIO July 14, 2008 Jarina D'Auria |
Five Things Kevin Mitnick Has Learned About Computer Security Legendary former hacker on hacking, being hacked, and companies that turn a blind eye to security. |
PC World August 3, 2002 Andrew Brandt |
Reality Douses DefCon Camaraderie Nation's new security priorities put new risks, greater penalties on cybercrime. |
InternetNews May 1, 2006 David Miller |
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. |
PC World April 10, 2001 |
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... |
InternetNews July 27, 2010 |
Security Pros Gather For Black Hat Confab Security experts, hackers and media types are filing into Sin City this week for the annual Black Hat USA security conference, a gathering that's endured and generated its share of controversy in the past. |
Linux Journal September 2001 Thomas Osterlie |
Review: Hacking Linux Exposed Hacking Linux Exposed deals with security-related threats to Linux systems. It's a book for practitioners by practitioners, with an emphasis on practice rather than theory... |
InternetNews December 1, 2005 Sean Michael Kerner |
Backup Software Under Attack A SANS report on top security vulnerabilities finds that backup and recovery software has become a favorite target of hackers. |
InternetNews December 30, 2005 Sean Michael Kerner |
Windows 0-Day Exploit Helped by Open Source? Is Metasploit helping to spread the zero day outbreak, or is it helping security professionals to protect against it? The answer depends. |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
InternetNews July 7, 2010 |
Hackers Snipe Back in Microsoft Security Row Bruised by Microsoft's criticism dismissing the work of third-party security researchers, a band of hackers has begun a campaign to publish proof-of-concept vulnerabilities in the software giant's products. |
InternetNews November 18, 2009 |
Metasploit Expands Vulnerability Test Framework New release aims to push the boundaries of open source vulnerability testing. |
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. |
AskMen.com Branden Peters |
How To: Avoid Getting Hacked Thankfully there are several ways to protect your information and identity from malicious attacks. Some are common sense and others require thought and money. |
Fast Company June 2013 |
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. |
InternetNews October 14, 2009 |
Google Hunts Down Malware "Google Hacking" goes official. |
New Architect February 2003 Joseph C. Panettieri |
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. |
Salon.com June 5, 2002 Andrew Leonard |
A new teenage wasteland? Script kiddies, Web site defacers, chat-room gangsters: Today's digital troublemakers get a bad rap. But in "The Hacker Diaries" we learn that they're really all right. |
InternetNews July 5, 2006 Sean Michael Kerner |
The Month of The Browser Bugs Begins A researcher found another critical hole in IE, but Firefox and Safari aren't safe from attack. |
BusinessWeek May 12, 2011 Riley & Vance |
Sony: The Company That Kicked the Hornet's Nest Security experts say Sony should have recognized the warning signs of an impending attack, which compromised 100 million accounts. |
Fast Company Eric Alt |
There's Now A $380,000 Bounty On The Heads Of Ashley Madison Hackers The parent company of AshleyMadison.com -- confirmed through acting Toronto Police Department staff superintendent Bryce Evans that they are offering a cash reward for information leading to the arrest of the hackers who leaked their clients' information. |
PC Magazine September 26, 2008 Corinne Iozzio |
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). |
InternetNews February 18, 2010 |
Metasploit Moving Into Commercial Mainstream What began as a standalone community project for testing exploits and fixing flaws is gaining traction in the commercial community, as more enterprises are rolling out support for Metasploit. |
PC Magazine March 16, 2004 Leon Erlanger |
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. |
InternetNews March 30, 2010 |
Microsoft Says IE's Defenses Not Unbeatable Microsoft touts 'defense in depth' as an effective deterrent after a white hat hacker last week demonstrated a complete takeover of Windows 7 running Internet Explorer 8. |
eCFO December 2000 Karen J. Bannan |
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. |
InternetNews July 18, 2006 Sean Michael Kerner |
Google Hacking Malicious Code Security researcher H.D. Moore has released a new malware search engine and its underlying code to help searchers find malware code that Google has indexed. |
Bank Systems & Technology September 15, 2007 Sharon Gaudin |
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. |
National Defense March 2014 Stew Magnuson |
Defense Companies Facing Array of New Cyberthreats There are new pitfalls out there for defense companies large and small that face a dizzying array of threats against their networks. |
InternetNews March 19, 2010 |
Google Fixes Its Browser Before Hacker Test Google patches Chrome for eight vulnerabilities that could have left users at risk. The fixes come just as white hat hackers are set to go to town in a vulnerability search contest. |
InternetNews December 17, 2010 |
Metasploit 3.5.1 Targets Cisco Networking Gear With its latest update, networking security testbed Metasploit adds features targeting Cisco's networking equipment in a new attack approach exploiting decade-old vulnerabilities. |
InternetNews February 1, 2008 Sean Michael Kerner |
Metasploit 3.1 Takes Aim at Windows Metasploit moves to new territory in earnest, with its first major update in a year. |
PC World December 20, 2001 Matt Berger |
Windows Patch Plugs 'Critical' Holes Microsoft issues a fix for a major flaw -- kept secret for five weeks -- that leaves Windows XP, Me, and some 98 systems vulnerable when online... |
InternetNews March 16, 2004 Ryan Naraine |
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. |