Similar Articles |
|
Fast Company Pavithra Mohan |
Obama Administration Proposes Sanctions In Retaliation For Chinese Cyberhacks In an effort to curb cyberhacking, the White House is currently developing economic sanctions that would impede the operations of Chinese companies in the U.S., the Washington Post reports. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
InternetNews January 28, 2009 Richard Adhikari |
Monster Breach Shows Security Needs Rethinking Is corporate security fighting yesterday's war with last decade's weapons? |
InternetNews November 30, 2010 |
WikiLeaks Cables Tie China to Google Attacks Whistleblower website begins publishing leaked diplomatic cables describing longstanding program of computer espionage and hacking orchestrated by the Chinese government. |
Fast Company Nikita Richardson |
Fingerprints of 5.6 Million Government Employees Stolen In Cyberattack Since it was announced in June that hackers had breached the U.S. Government's Office of Personnel Management database, the full breadth of the crippling cyberattack has gone from bad to worse. |
Fast Company June 2013 |
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. |
InternetNews September 30, 2010 |
FBI Busts International Cybercrime Syndicate After a year-long investigation, the FBI and local law enforcement charges 37 hackers with using Zeus Trojan to steal more than $3 million from U.S. banks. |
Bank Technology News April 2007 Rebecca Sausner |
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. |
The Motley Fool February 25, 2011 David Lee Smith |
Big Oil: Hacked From China First it was Google, and now it turns out Chinese hackers have hit Big Oil. |
BusinessWeek April 10, 2008 |
China's Response to BusinessWeek A spokesperson of the Chinese Embassy to the United States responds to questions sent to authorities in Beijing and Washington regarding cyber crimes. |
InternetNews July 20, 2005 Tim Gray |
Hackers Head to School in Droves Universities appear to be the new favorite target of hackers, as the University of Southern California becomes the latest to get hit. |
Fast Company Neal Ungerleider |
Italian Surveillance Firm Called HackingTeam Gets Hacked An Italian company that sells sophisticated tools for spying on Internet users to the world's most repressive governments appears to have just been the target of a massive hacker attack |
Popular Mechanics January 13, 2010 Glenn Derene |
Why China Needs Google More Than Google Needs China Yesterday Google announced that Gmail accounts of Chinese dissidents had been hacked as part of a broad spying operation apparently tied to the Chinese government. |
National Defense July 2013 Yasmin Tadjdeh |
Cyberspies Can Destroy, Corrupt Data as Easily as They Snoop If hackers can steal a company's top-secret data, they can just as easily destroy a company's network, experts said recently. |
Bank Systems & Technology September 15, 2007 Sharon Gaudin |
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. |
Reason January 2008 Jacob Sullum |
Data: High Risk Overall, marijuana arrests in the U.S. have increased more than 150% since 1990. |
Fast Company Pavithra Mohan |
Hackers Threaten To Expose Private Information Of Ashley Madison Users A team of hackers has stolen data from AshleyMadison.com, an online dating site targeted at people who are already in relationships. |
InternetNews January 15, 2010 David Needle |
VeriSign Ties Google Attack to China Government Security firm cite sources claiming hackers acted on official authority from Chinese government. |
Bank Technology News April 2001 Maria Bruno |
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... |
The Motley Fool August 24, 2009 Tim Beyers |
The Uncomfortable Truth About Credit Cards Even if you can't stop a hacker, you can protect yourself. |
The Motley Fool December 5, 2010 Dean Takahashi. |
WikiLeaks Reveals How Google Was Targeted in China Documents lay bare vast hacking attempts by Chinese leaders. |
InternetNews February 4, 2010 |
Firewall Mishap Puts Iowa Workers' Data at Risk More than 80,000 people affiliated with the Hawkeye State's casino and racing industry were victimized by a cyber attack that most likely originated in China. |
InternetNews April 20, 2010 |
Hackers Breached Google's Password Hub: Report New report cites source close to investigation claiming that hackers in China were able to compromise the password service that acts as gateway to Google's Web products and services. |
InternetNews June 2, 2011 |
Google Blames China for Gmail Hack According to Google, their security systems discovered a phishing campaign that had targeted Gmail in an effort to obtain user passwords. |
InternetNews March 25, 2010 |
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. |
AskMen.com Bernie Alexander |
Cyber Crime: The Wild West, Online Forget about breaking and entering, aggravated assault and armed robbery. Cyber crime is taking over. |
National Defense June 2013 Stew Magnuson |
Defense Industrial Base Wary of Cybersecurity Laws That hackers are intent on stealing U.S. trade secrets -- particularly those pertaining to the military -- is a given. That the United States is capable of responding to this threat remains to be seen. |
InternetNews December 23, 2004 Jim Wagner |
Cyber Criminals Prove Elusive Law enforcement efforts to snare virus writers are improving, but the most destructive ones have evaded capture. |
Salon.com October 27, 2000 Andrew Leonard |
Who cracked Microsoft? Many free-software hackers make no attempt to hide their hatred of Bill Gates -- could they be the culprits? |
The Motley Fool June 16, 2011 Rich Smith |
America Hacked! Hackers are progressing, attacking our government websites with impunity. |
PC Magazine September 26, 2008 Corinne Iozzio |
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). |
National Defense July 2012 Stew Magnuson |
Al-Qaida May Have Plans to Manipulate Anonymous Hacking Group Anonymous, a loosely organized group of hackers that has targeted big businesses and governments, could be co-opted by nation states and terrorist groups that want to use it for their own ends, cybersecurity experts said. |
The Motley Fool August 28, 2006 Jack Uldrich |
Yahoo! Takes a Hack at a New Idea Opening up the company to hackers could generate new ideas. It seems like a promising proposal to gain some creative knowledge. |
InternetNews February 18, 2010 |
Kneber Botnet Pierces 2,500 Organizations So-called 'Kneber' botnet collects log-in credentials to online financial systems, social networking sites and e-mail systems to break into accounts and steal corporate and government data at an astonishing pace. |
InternetNews April 8, 2010 |
Massive Cyber Spy Ring Seen Operating in China New report details the activities of the "Shadow network," a sophisticated group of cyber criminals traced back to China, prompting denial from a state official. |
InternetNews November 3, 2006 Ed Sutherland |
FBI: Twilight For Bank Phishermen U.S. and Poland hackers had targeted a major financial institution. |
PC World April 10, 2001 |
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... |
The Motley Fool March 1, 2011 Gary Cassady |
More Hacking From Inside China, Trading Opportunities Is there a way to profit off of the misfortune of cyberattacks? |
Fast Company Daniel Terdiman |
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. |
InternetNews June 9, 2009 Alex Goldman |
T-Mobile Hacked? Although a blog reported yesterday that T-Mobile was hacked, all the hackers actually seemed to have was a list of T-Mobile server names. |