Similar Articles |
|
Popular Mechanics April 2009 Glenn Derene |
How Vulnerable is U.S. Infrastructure to a Major Cyber Attack? The next world war might not start with a bang, but with a blackout. |
Chemistry World June 10, 2015 Emma Stoye |
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
PC World December 20, 2001 Matt Berger |
Windows Patch Plugs 'Critical' Holes Microsoft issues a fix for a major flaw -- kept secret for five weeks -- that leaves Windows XP, Me, and some 98 systems vulnerable when online... |
PC World May 15, 2001 Frank Thorsberg |
Does Your PC Harbor Zombies Waiting to Attack? Unprotected broadband connections can leave your PC open to raids by malicious hackers... |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
PC World September 1, 2000 Jeff Sengstack |
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. |
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
Macworld May 2001 Mel Beckman |
Norton Personal Firewall 1.0 Internet-protection software for individual users needs beefing up... |
Bank Technology News April 2007 Rebecca Sausner |
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. |
National Defense January 2005 Joe Pappalardo |
Homeland Defense Research Agency Directs Attention To Cyber Security Fearing the specter of crippling attacks on government and private sector computer systems, federal officials are stepping up efforts to foil cyber terrorism. |
IndustryWeek July 22, 2009 Jonathan Katz |
Leveraging Lean Designs Think flow and flexibility when designing or relocating to a new facility. |
Popular Mechanics April 21, 2009 Glenn Derene |
Obama Set to Provide a New Direction for Cyber Security in U.S. In light of shocking security lapses, Obama will soon announce a new direction for the United States to combat cyber threats. |
National Defense October 2015 Tim Larkins |
U.S. Government Slow to React to Cyber Attacks This is the first in a series of articles looking at critical infrastructure in the United States and exploring the consequences of cyber intrusions. |
InternetNews September 15, 2009 |
U.S. Reviewing Cyber Threat to Power Grid Chinese researcher uses publicly available data to demonstrate how cyber terrorists could knockout entire West Coast grid with relative ease. |
PC Magazine October 1, 2003 Brett Glass |
Don't Let Your PC Become a Porn Zombie Protect your computer from takeover. We tell you how. |
Fast Company Daniel Terdiman |
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. |
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. |
Bank Technology News October 2008 Dan Sharplin |
Keep the Grid Going and Reap Rewards Instead of simply putting up with higher electric bills and periodic service disruptions, bank chains have a unique opportunity to become part of the energy solution-and to profit from it at the same time. |
PC World March 2006 Andrew Sullivan |
Programs in Peril Popular applications have more security flaws than Windows does. |
InternetNews January 28, 2010 |
IT Managers Brace for a Barrage of Cyber Attacks Despite increased awareness and new state and federal legislation, most enterprise IT managers expect to be victimized by a major cyber attack in the next five years. |
T.H.E. Journal February 2009 John K. Waters |
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? |
CIO April 15, 2004 Eric Knorr |
Guard the Application Layer Firewalls alone are no longer enough to protect your online assets |
BusinessWeek August 22, 2005 Grow & Hamm |
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. |
PC Magazine February 1, 2006 Cade Metz |
The Sorry State of Security Time to face facts: when it comes to our online safety woes, everybody is to blame. |
PC World May 2003 Daniel Tynan |
Dawn of the Superworm Experts warn that the Slammer worm is a harbinger of worse strains to come. |
CFO January 30, 2004 Esther Shein |
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. |
Food Processing May 2005 Mike Pehanich |
How to retrofit an aging plant Food processors looking to retrofit aging facilities to get more out of their capital budgets should heed these "rules of retro" before they bring their plants into the 21st century. |
Wall Street & Technology September 17, 2007 Melanie Rodier |
Online Security Attacks Against Financial Institutions Rapidly Increasing Gone are the days of teenagers sitting in their parents' basements trying to hack into a company's computer system just to prove a point. Today, hacking is an organized crime enterprise -- and it is bigger than ever. |
National Defense July 2012 Eric Beidel |
iCollege Takes Nation's Cybersecurity Leaders Back to School The iCollege, also known as the Information Resources Management College, is working to fill the gap in knowledge that exists among the senior leadership trying to carve out policies and strategies under which the government's "cyberwarriors" must operate. |
National Defense August 2012 Eric Beidel |
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. |
Popular Mechanics September 2008 Glenn Derene |
Top 3 Threats and Countermeasures From the Coming Cyberwar: Glossary An explanation of terms like DDoS, root-level penetration, etc. |
InternetNews October 9, 2008 Sean Michael Kerner |
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. |
New Architect February 2003 Joseph C. Panettieri |
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. |
Wall Street & Technology January 5, 2007 Larry Tabb |
Preparing for the Inevitable While electronic thefts can be cleaner, less physical and certainly less bloody, the chance of getting money out of a brokerage or bank illegally is usually greater with a gun than a computer. But as the criminals and terrorists get smarter, we too must raise the bar. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
Fast Company Victor Kotsev |
Why International Cybercrime Is Going To Keep Getting Worse Many countries have devoted cyber warfare units that know how to cover their tracks, and just about every country now has cyber vigilantes and criminals motivated by their own specific needs, missions or grievances. |
InternetNews April 8, 2009 Alex Goldman |
U.S. Electricity Grid Compromised The threat is real but, unfortunately, not new. What is new, say reports, is actual evidence of espionage. |
PC World July 9, 2002 Dan Verton |
Experts Expect a Major Terrorist Cyberattack Security and intelligence officials say an attack will happen, and warn that we're not ready to respond. |
PC Magazine December 20, 2006 Robert Lemos |
The New Security Threats More secure operating systems mean that attackers are looking elsewhere for holes to sneak through. |
Fast Company Michael Grothaus |
For First Time, Cyber Attack Causes Widespread Electricity Blackout The first known cyber attack to cause widespread public blackouts has occurred in Ukraine, it is believed. |
PC Magazine September 26, 2008 Corinne Iozzio |
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). |
InternetNews February 2, 2009 Richard Adhikari |
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. |