Similar Articles |
|
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
PC World April 10, 2001 |
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... |
eCFO December 2000 Karen J. Bannan |
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. |
PC World August 3, 2002 Andrew Brandt |
Reality Douses DefCon Camaraderie Nation's new security priorities put new risks, greater penalties on cybercrime. |
PC World September 1, 2000 Jeff Sengstack |
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
Salon.com June 5, 2002 Andrew Leonard |
A new teenage wasteland? Script kiddies, Web site defacers, chat-room gangsters: Today's digital troublemakers get a bad rap. But in "The Hacker Diaries" we learn that they're really all right. |
Fast Company June 2013 |
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. |
PC Magazine September 26, 2008 Corinne Iozzio |
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). |
CRM October 1, 2005 Marshall Lager |
The Hot Skinny on Hackers What do they know, and how do they find out? A recent "hackers convention" revealed some of their secrets. |
BusinessWeek August 22, 2005 Grow & Hamm |
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. |
Entrepreneur December 2005 Amanda C. Kooser |
Can You Hack It? Build the best defense you can against hackers. |
Registered Rep. May 24, 2011 Lauren Barack |
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. |
New Architect February 2003 Joseph C. Panettieri |
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. |
Salon.com April 4, 2001 Caroline Benner |
The phantom cyber-threat We should stop worrying about computer terrorism and learn who our real enemies are... |
PC Magazine August 23, 2007 John Brandon |
Q&A with the Forefather of Hacking Kevin Mitnick, arguably the world's most famous hacker, sets the record straight on what he's doing now, what he didn't do back then, and why kids should not follow in his footsteps. |
PC World December 20, 2001 Matt Berger |
Windows Patch Plugs 'Critical' Holes Microsoft issues a fix for a major flaw -- kept secret for five weeks -- that leaves Windows XP, Me, and some 98 systems vulnerable when online... |
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. |
InternetNews October 9, 2008 Sean Michael Kerner |
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. |
InternetNews August 3, 2007 Sean Michael Kerner |
Black Hat And The Jedi Force Hackers have a lot of different tools at their disposal, but low-tech hacking may be all they really need. |
PC Magazine March 16, 2004 Leon Erlanger |
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. |
National Defense July 2007 Breanne Wagner |
Experts Downplay Imminent Threat of Cyberterrorism U.S. officials are worried about the threat of a terrorist attack against civilian and government computer systems, but experts say any attack by cyber terrorists is likely to be non-debilitating worms and viruses. |
National Defense August 2012 Eric Beidel |
Companies Rush to Tailor Products to New Cyber-Attacks The cybersecurity marketplace is flooded with products that tout the ability to keep networks and computers safe from intruders. |
PC Magazine October 1, 2003 Brett Glass |
Don't Let Your PC Become a Porn Zombie Protect your computer from takeover. We tell you how. |
Bank Technology News April 2007 Rebecca Sausner |
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. |
Bank Systems & Technology September 15, 2007 Sharon Gaudin |
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. |
InternetNews June 22, 2006 Sean Michael Kerner |
Search Engines And Their Hacker Friends Search engines have become indispensable tools for hundreds of millions of people. Including hackers who are use them to find vulnerable networks, machines and services with relative ease. |
PC World November 2001 Kim Zetter |
PC Security: Holey Software! New security bugs appear weekly, letting hackers attack your data. Here's why apps are so full of holes and how you can protect yourself... |
BusinessWeek August 13, 2009 Joel Schectman |
Computer Hacking Made Easy Botnet attacks like the one that took down Twitter are becoming so easy and cheap, almost anyone can do it. |
T.H.E. Journal September 2003 Roger Del Russo |
Securing Your Computer Network Your entire district could be brought to its knees by a hacker's assault, and the costs of reviving the network could be astronomical. While district administrators may have devised plans for securing the physical plant of the school, they rarely consider the vulnerability of their computer networks. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
Entrepreneur June 2010 Ericka Chickowski |
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. |
Bank Technology News April 2001 Maria Bruno |
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... |
Wall Street & Technology September 17, 2007 Melanie Rodier |
Online Security Attacks Against Financial Institutions Rapidly Increasing Gone are the days of teenagers sitting in their parents' basements trying to hack into a company's computer system just to prove a point. Today, hacking is an organized crime enterprise -- and it is bigger than ever. |
Popular Mechanics February 2006 Brian Krebs |
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. |
Chemistry World June 10, 2015 Emma Stoye |
Security experts warn chemical plants are vulnerable to cyber-attacks Security experts are warning that the computers controlling machinery in chemical plants, power stations and other critical infrastructure are vulnerable to attacks from hackers. |
Salon.com June 20, 2001 Damien Cave |
End of an affair? Hackers love their TiVos, and the company is fond of its hackers. But as in any relationship, sometimes one party goes a bit too far... |
CIO July 14, 2008 Jarina D'Auria |
Five Things Kevin Mitnick Has Learned About Computer Security Legendary former hacker on hacking, being hacked, and companies that turn a blind eye to security. |
PC World May 15, 2001 Frank Thorsberg |
Does Your PC Harbor Zombies Waiting to Attack? Unprotected broadband connections can leave your PC open to raids by malicious hackers... |
PC World March 2006 Andrew Sullivan |
Programs in Peril Popular applications have more security flaws than Windows does. |
PC World November 2004 Harry McCracken |
Is This Any Way to Fix Security Holes? How today's software patching process actually helps hackers do their job. |
Popular Mechanics April 2009 Glenn Derene |
How Vulnerable is U.S. Infrastructure to a Major Cyber Attack? The next world war might not start with a bang, but with a blackout. |
CFO August 1, 2002 Scott Leibs |
First, Who's On? Hackers and viruses make for good copy, but the most significant threat may come from within. |
Salon.com February 6, 2001 Andrew Leonard |
Hunting the wild hacker Work should be play, says a new book that sets forth the emerging ethical code of free-software programmers... |
Popular Mechanics June 30, 2008 Glenn Derene |
Inside NSA Red Team Secret Ops With Government's Top Hackers Highly skilled firewall-crackers help the government keep the bad guys out of the country's computer systems. |
CIO June 1, 2001 Tracy Mayor |
Break Glass, Pull Handle, Call FBI If you're the victim of a security breach or a virus attack, get the feds on your side... |
Wall Street & Technology January 5, 2007 Larry Tabb |
Preparing for the Inevitable While electronic thefts can be cleaner, less physical and certainly less bloody, the chance of getting money out of a brokerage or bank illegally is usually greater with a gun than a computer. But as the criminals and terrorists get smarter, we too must raise the bar. |
Fast Company Victor Kotsev |
Why International Cybercrime Is Going To Keep Getting Worse Many countries have devoted cyber warfare units that know how to cover their tracks, and just about every country now has cyber vigilantes and criminals motivated by their own specific needs, missions or grievances. |
National Defense March 2014 Stew Magnuson |
Defense Companies Facing Array of New Cyberthreats There are new pitfalls out there for defense companies large and small that face a dizzying array of threats against their networks. |