Similar Articles |
|
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
PC World April 10, 2001 |
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... |
InternetNews June 28, 2005 Tim Gray |
UConn Finds Hacking Program in Server University of Connecticut officials say a server containing the personal data of many of its staff and students was compromised on at least one occasion. |
InternetNews August 18, 2009 |
U.S. Fingers TJX Hacker in Heartland Breach Attacks on Heartland, 7-Eleven and Hannaford Bros. netted the criminals 130 million credit card numbers, according to the DoJ. |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
CIO June 1, 2001 Tracy Mayor |
Break Glass, Pull Handle, Call FBI If you're the victim of a security breach or a virus attack, get the feds on your side... |
Bank Technology News April 2007 Rebecca Sausner |
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. |
Registered Rep. May 24, 2011 Lauren Barack |
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. |
Bank Technology News April 2001 Maria Bruno |
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... |
Fast Company June 2013 |
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. |
eCFO December 2000 Karen J. Bannan |
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. |
InternetNews March 12, 2010 |
Hackers Strike Popular Los Angeles Hotel The Westin Bonaventure Hotel & Suites gets targeted by criminals who may have gained access to travelers' credit cards. |
National Defense July 2007 Breanne Wagner |
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. |
New Architect February 2003 Joseph C. Panettieri |
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. |
Fast Company Victor Kotsev |
Why International Cybercrime Is Going To Keep Getting Worse Many countries have devoted cyber warfare units that know how to cover their tracks, and just about every country now has cyber vigilantes and criminals motivated by their own specific needs, missions or grievances. |
InternetNews December 20, 2005 Jim Wagner |
Guidance Software Investigating Stolen Data Computer forensic specialist Guidance Software found itself on the receiving end of a malicious hacking attack that managed to swipe sensitive information on reportedly thousands of customers. |
Popular Mechanics February 2006 Brian Krebs |
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. |
Investment Advisor March 1, 2011 Lewis Schiff |
Protect Affluent Clients' Data -- and Privacy One mistake can break the trust you've established with hundreds of clients. |
InternetNews July 20, 2005 Tim Gray |
Hackers Head to School in Droves Universities appear to be the new favorite target of hackers, as the University of Southern California becomes the latest to get hit. |
InternetNews November 29, 2007 Andy Patrizio |
Cyber Crime Grows More Dangerous And Sophisticated McAfee study finds online threats are getting more complex and brazen in what they target, like the U.S. military. |
AskMen.com Bernie Alexander |
Cyber Crime: The Wild West, Online Forget about breaking and entering, aggravated assault and armed robbery. Cyber crime is taking over. |
CIO January 1, 2002 Sarah D. Scalet |
How to Not Recover from Getting Hacked (A Loser's Guide to Failure) A guide for what not to do when you get hacked. Take a moment to learn from the mistakes that others have made. |
InternetNews December 12, 2006 David Needle |
UCLA Database Hole Exposed 800,000 to ID Theft UCLA Web site touted the school's IT security the same day it discovered hackers had broken into its computer system. |
CRM September 2012 Kelly Liyakasa |
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. |
InternetNews March 29, 2005 Tim Gray |
Another University Suffers Security Breach UC Berkeley joins a growing list of schools losing vital student information to hackers. |
InternetNews March 21, 2005 Tim Gray |
California University Computer System Hacked Attackers gain access to private student data. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
InternetNews December 16, 2010 |
760,000 Exposed in Ohio State Breach A massive data breach at Ohio State University has current and former students and staff scrambling to check their credit reports. |
Fast Company Daniel Terdiman |
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. |
National Defense December 2009 Austin Wright |
National-Security Infrastructure Faces Relentless Cyberespionage Campaign U.S. government and defense-industry networks face a relentless onslaught from cyber-spies who seek some of the nation's most heavily guarded secrets |
InternetNews December 11, 2009 |
University Student Data Exposed in Server Breach More than nine years worth of student data was exposed last month when hackers managed to access the admissions server at Eastern Illinois University. |
InternetNews November 25, 2008 Richard Adhikari |
Mainframe Breach at LensCrafters Parent Hits 59K Eyewear giant Luxottica Group becomes the latest in a string of high-profile data leaks. |
National Defense February 2006 Stew Magnuson |
Network Vulnerabilities Worry Pentagon Pentagon officials call the Defense Department's global communications network its weakest link. The question is how to manage the risk, and create a balance between security and the necessity of working with international partners and the private sector. |
U.S. Banker March 2003 Melissa Solomon |
Is California Asking for Too Much Information? A new law is aimed at protecting customers from identity theft. The disclosures finance companies make could be embarrassing. Not telling could hurt even more. |
BusinessWeek August 22, 2005 Grow & Hamm |
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. |
InternetNews October 18, 2010 |
Massive Data Breach Zings Florida University The FBI is investigating another hacking incident that exposed 106,000-plus students' most sensitive information. |
National Defense January 2005 Joe Pappalardo |
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. |
Investment Advisor June 2008 Irace & Mehta |
Security in a New Age How to protect your firm from 21st century online criminals |
Fast Company Pavithra Mohan |
Hackers Threaten To Expose Private Information Of Ashley Madison Users A team of hackers has stolen data from AshleyMadison.com, an online dating site targeted at people who are already in relationships. |
InternetNews January 5, 2010 |
Hacker Hits Eastern Washington University Colleges continue to be popular targets for hackers, with another 130,000 student records exposed. |
Popular Mechanics June 30, 2008 Glenn Derene |
Inside NSA Red Team Secret Ops With Government's Top Hackers Highly skilled firewall-crackers help the government keep the bad guys out of the country's computer systems. |
IEEE Spectrum October 2008 David Schneider |
Fresh Phish How a recently discovered flaw in the Internet's Domain Name System makes it easy for scammers to lure you to fake Web sites |
The Motley Fool December 5, 2010 Dean Takahashi. |
WikiLeaks Reveals How Google Was Targeted in China Documents lay bare vast hacking attempts by Chinese leaders. |
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. |
InternetNews September 17, 2008 Richard Adhikari |
Bill Would Give ID Theft Victims More Weapons A bill containing provisions against cyber criminals that awaits the President's signature. Does it do enough? |
Fast Company Neal Ungerleider |
Hackers Who Stole U.S. Government Employee Data Reportedly Breached American Airlines According to Bloomberg, both the airline and travel reservation firm Sabre appear to have been the subject of recent breaches. |
InternetNews October 16, 2007 Andy Patrizio |
A New Way to Hack Yourself Core Security Technologies updates its intrusion detection software to simulate outside attacks on your network and see how far the bad guys can get. |
T.H.E. Journal September 2003 Roger Del Russo |
Securing Your Computer Network Your entire district could be brought to its knees by a hacker's assault, and the costs of reviving the network could be astronomical. While district administrators may have devised plans for securing the physical plant of the school, they rarely consider the vulnerability of their computer networks. |
Popular Mechanics April 2009 Glenn Derene |
How Vulnerable is U.S. Infrastructure to a Major Cyber Attack? The next world war might not start with a bang, but with a blackout. |