Similar Articles |
|
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
New Architect February 2003 Joseph C. Panettieri |
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. |
BusinessWeek August 22, 2005 Grow & Hamm |
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. |
CRM May 2015 Leonard Klie |
Data Security Should Be in Everyone's Job Description Protecting valuable customer information should begin in the contact center and end in the executive suite. |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
Entrepreneur December 2005 Amanda C. Kooser |
Can You Hack It? Build the best defense you can against hackers. |
PC Magazine September 26, 2008 Corinne Iozzio |
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). |
CRM October 1, 2005 Marshall Lager |
The Hot Skinny on Hackers What do they know, and how do they find out? A recent "hackers convention" revealed some of their secrets. |
Wall Street & Technology October 23, 2007 Melanie Rodier |
Financial Firms Continue to Struggle to Plug Security Loopholes New technologies, such as pattern analysis, as well as awareness and training can help financial services firms keep hackers at bay. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
Popular Mechanics February 2006 Brian Krebs |
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. |
PC World April 10, 2001 |
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... |
PC World September 1, 2000 Jeff Sengstack |
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. |
PC Magazine March 16, 2004 Leon Erlanger |
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. |
AskMen.com Bernie Alexander |
Cyber Crime: The Wild West, Online Forget about breaking and entering, aggravated assault and armed robbery. Cyber crime is taking over. |
Registered Rep. May 24, 2011 Lauren Barack |
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. |
CFO January 1, 2006 John McPartlin |
Hackers Find Backers Large organizations should prepare themselves for more-clever and more-targeted attacks against their security infrastructures this year. Computer crime is now a game for professionals. Are companies prepared to respond? |
National Defense March 2014 Stew Magnuson |
Defense Companies Facing Array of New Cyberthreats There are new pitfalls out there for defense companies large and small that face a dizzying array of threats against their networks. |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
CFO October 1, 2004 Russ Banham |
The Enemy Within When it comes to combating worms, Trojan horses, and viruses, technology alone is not enough. Human error can undo almost any firewall or safeguard. Yet in some cases the fixes are remarkably simple. |
BusinessWeek August 13, 2009 Joel Schectman |
Computer Hacking Made Easy Botnet attacks like the one that took down Twitter are becoming so easy and cheap, almost anyone can do it. |
Fast Company June 2013 |
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. |
Wall Street & Technology January 5, 2007 Larry Tabb |
Preparing for the Inevitable While electronic thefts can be cleaner, less physical and certainly less bloody, the chance of getting money out of a brokerage or bank illegally is usually greater with a gun than a computer. But as the criminals and terrorists get smarter, we too must raise the bar. |
CIO March 1, 2007 Allan Holmes |
Bad Neighborhood Many mid-market enterprises say they have neither the time, money nor resources to spend on security. Which may be why the crooks are targeting them. |
Salon.com September 14, 2000 Janelle Brown |
Crack SDMI? No thanks! Hackers turn up their noses at a "challenge" proposed by the recording and electronics industries. |
New Architect May 2002 Jesus Mena |
Active Fraud Prevention Using data mining to combat online theft... |
CFO August 1, 2002 Scott Leibs |
First, Who's On? Hackers and viruses make for good copy, but the most significant threat may come from within. |
Wall Street & Technology September 17, 2007 Melanie Rodier |
Online Security Attacks Against Financial Institutions Rapidly Increasing Gone are the days of teenagers sitting in their parents' basements trying to hack into a company's computer system just to prove a point. Today, hacking is an organized crime enterprise -- and it is bigger than ever. |
Entrepreneur June 2010 Ericka Chickowski |
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. |
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. |
BusinessWeek May 29, 2006 Ante & Grow |
Meet The Hackers Cybercrooks are stealing billions. An inside look at law enforcement's biggest targets. |
National Defense May 2010 Stew Magnuson |
Russian Cyberthief Case Illustrates Security Risks For U.S. Corporations While the federal government and Congress are making a push to toughen up the nation's defenses in cyberspace, most of the vulnerabilities that thieves and spies are exploiting through the Internet are in the private sector. |
PC World August 3, 2002 Andrew Brandt |
Reality Douses DefCon Camaraderie Nation's new security priorities put new risks, greater penalties on cybercrime. |
Entrepreneur September 2002 Mike Hogan |
Wreck-Ware P2P exposes you to attack from hackers looking to filch files. Here's how to avoid a swap-and-run. |
CIO January 1, 2002 Sarah D. Scalet |
How to Not Recover from Getting Hacked (A Loser's Guide to Failure) A guide for what not to do when you get hacked. Take a moment to learn from the mistakes that others have made. |
BusinessWeek May 12, 2011 Riley & Vance |
Sony: The Company That Kicked the Hornet's Nest Security experts say Sony should have recognized the warning signs of an impending attack, which compromised 100 million accounts. |
Bank Technology News April 2001 Maria Bruno |
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... |
Inc. September 15, 2000 David S. Bernstein |
We've Been Hacked Not scared of losing your data to a corporate thief? You should be... |
Entrepreneur December 2006 |
Well, Honestly! Establishing ethics standards makes sense for your bottom line. |
Fast Company Eric Alt |
There's Now A $380,000 Bounty On The Heads Of Ashley Madison Hackers The parent company of AshleyMadison.com -- confirmed through acting Toronto Police Department staff superintendent Bryce Evans that they are offering a cash reward for information leading to the arrest of the hackers who leaked their clients' information. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
The Motley Fool June 27, 2011 Tim Beyers |
Your Tech Portfolio Has Been Hacked! And that's a good thing. Has the world turned upside down? Hackers who've made headlines for torturing tech companies are turning to honest work. |
CFO February 1, 2012 Russ Banham |
Where the Money Is, and the Security Isn't Cyber thieves are increasingly targeting small and midsize businesses, and why not? Most SMBs do little to protect themselves. |
InternetNews June 22, 2006 Sean Michael Kerner |
Search Engines And Their Hacker Friends Search engines have become indispensable tools for hundreds of millions of people. Including hackers who are use them to find vulnerable networks, machines and services with relative ease. |
Bank Technology News April 2007 Rebecca Sausner |
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. |
Inc. August 2008 Michael Fitzgerald |
Help! Somebody Save Our Files! How to handle and prevent the most common data disasters. |
PC Magazine August 23, 2007 John Brandon |
Q&A with the Forefather of Hacking Kevin Mitnick, arguably the world's most famous hacker, sets the record straight on what he's doing now, what he didn't do back then, and why kids should not follow in his footsteps. |
Fast Company Pavithra Mohan |
Hackers Threaten To Expose Private Information Of Ashley Madison Users A team of hackers has stolen data from AshleyMadison.com, an online dating site targeted at people who are already in relationships. |
CFO January 30, 2004 Esther Shein |
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. |
Bank Technology News June 2001 Karen Epper Hoffman |
Vendors Take Aim at Online Crooks Neural nets help combat payment fraud... |