Similar Articles |
|
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
PC Magazine September 26, 2008 Corinne Iozzio |
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
Fast Company June 2013 |
From MIT To WikiLeaks: A Brief History Of Hacking A survey of news about hacking and hackers, both good and bad, from the 1950s to the present. |
Salon.com June 5, 2002 Andrew Leonard |
A new teenage wasteland? Script kiddies, Web site defacers, chat-room gangsters: Today's digital troublemakers get a bad rap. But in "The Hacker Diaries" we learn that they're really all right. |
New Architect February 2003 Joseph C. Panettieri |
Dangerous Dealings Reformed hackers want to lend a hand with your IT security strategy. |
BusinessWeek May 30, 2005 Brian Grow |
Hacker Hunters There's a new breed of crime-fighter prowling cyberspace: the hacker hunters. |
Wired Steven Levy |
Wizzywig Cartoonist Inks a Phreakin' Comic Book Ever since Kevin Mitnick's notorious exploits of the early 1990s, commentary inspired by the dark-side hacker has proliferated. The latest entry is Wizzywig, a four-part graphic novel by Ed Piskor. |
Wired July 21, 2008 Scott Brown |
WarGames: A Look Back at the Film That Turned Geeks and Phreaks Into Stars How did WarGames become the geek-geist classic that legitimized hacker culture, minted the nerd hero -- and maybe even changed American defense policy? |
PC Magazine August 23, 2007 John Brandon |
Q&A with the Forefather of Hacking Kevin Mitnick, arguably the world's most famous hacker, sets the record straight on what he's doing now, what he didn't do back then, and why kids should not follow in his footsteps. |
CIO June 1, 2001 Tracy Mayor |
Break Glass, Pull Handle, Call FBI If you're the victim of a security breach or a virus attack, get the feds on your side... |
AskMen.com Bernie Alexander |
Cyber Crime: The Wild West, Online Forget about breaking and entering, aggravated assault and armed robbery. Cyber crime is taking over. |
Bank Technology News April 2001 Maria Bruno |
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... |
Popular Mechanics February 2006 Brian Krebs |
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. |
Wall Street & Technology September 17, 2007 Melanie Rodier |
Online Security Attacks Against Financial Institutions Rapidly Increasing Gone are the days of teenagers sitting in their parents' basements trying to hack into a company's computer system just to prove a point. Today, hacking is an organized crime enterprise -- and it is bigger than ever. |
BusinessWeek May 29, 2006 Ante & Grow |
Meet The Hackers Cybercrooks are stealing billions. An inside look at law enforcement's biggest targets. |
eCFO December 2000 Karen J. Bannan |
Fear of the Black Hats Increasingly, companies are hiring hackers to test their network firewalls. This may not be such a good idea. |
CIO July 14, 2008 Jarina D'Auria |
Five Things Kevin Mitnick Has Learned About Computer Security Legendary former hacker on hacking, being hacked, and companies that turn a blind eye to security. |
Entrepreneur December 2005 Amanda C. Kooser |
Can You Hack It? Build the best defense you can against hackers. |
BusinessWeek August 22, 2005 Grow & Hamm |
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. |
Bank Systems & Technology September 15, 2007 Sharon Gaudin |
Number Of Hackers Attacking Banks Jumps 81% Hackers no longer need to be technical wizards to set up an operation to steal people's banking information and then rob their accounts. |
InternetNews November 11, 2009 |
DoJ Busts Up Eastern European Hacking Ring Feds indict seven hackers and conspirators responsible for ripping off more than $9 million from an Atlanta-based credit card processing company. |
InternetNews October 9, 2008 Sean Michael Kerner |
No/Low/High-Tech Hacking: It All Matters Don't point the finger at hackers for all security woes. Point hacker tools at yourself to see what's wrong with your stuff, instead. |
Bank Technology News April 2007 Rebecca Sausner |
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. |
Salon.com July 20, 2000 Brendan I. Koerner |
To heck with hactivism Do politically motivated hackers really think they're promoting global change by defacing Web sites? |
InternetNews August 3, 2007 Sean Michael Kerner |
Black Hat And The Jedi Force Hackers have a lot of different tools at their disposal, but low-tech hacking may be all they really need. |
PC World September 1, 2000 Jeff Sengstack |
Make Your PC Hacker-Proof Our test of six personal firewalls finds the best ones for keeping uninvited guests out of your office or home system. |
PC World August 3, 2002 Andrew Brandt |
Reality Douses DefCon Camaraderie Nation's new security priorities put new risks, greater penalties on cybercrime. |
National Defense May 2010 Stew Magnuson |
Russian Cyberthief Case Illustrates Security Risks For U.S. Corporations While the federal government and Congress are making a push to toughen up the nation's defenses in cyberspace, most of the vulnerabilities that thieves and spies are exploiting through the Internet are in the private sector. |
Wall Street & Technology January 5, 2007 Larry Tabb |
Preparing for the Inevitable While electronic thefts can be cleaner, less physical and certainly less bloody, the chance of getting money out of a brokerage or bank illegally is usually greater with a gun than a computer. But as the criminals and terrorists get smarter, we too must raise the bar. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
Registered Rep. May 24, 2011 Lauren Barack |
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. |
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. |
InternetNews January 22, 2009 Richard Adhikari |
Possible Racist SMS Message Rocks U. of Florida A possibly racist text message sent to the cell phones of 42,000 students and faculty of the University of Florida at Gainesville, Fla., has sparked widespread anger. System locked down after angry students complain; suspect arrested. |
BusinessWeek August 13, 2009 Joel Schectman |
Computer Hacking Made Easy Botnet attacks like the one that took down Twitter are becoming so easy and cheap, almost anyone can do it. |
BusinessWeek April 17, 2006 Brian Grow |
The Mind Games Cybercrooks Play Hackers are exploiting psychological vulnerabilities to gain access to your data. |
PC World August 22, 2007 Harry McCracken |
What's Hackable Today? Almost Everything! Hacks make products better in unexpected ways. Blessed be the hackers who create them and the companies that permit them. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
InternetNews April 7, 2004 Vince Barnes |
An Hour with Kevin Mitnick, Part 2 We conclude our talk with Kevin Mitnick as he provides a glimpse into the mindset of a hacker, discusses attitudes toward security spending and gives a reason to think twice before taking caller ID at face value. |
PC World December 2003 Andrew Brandt |
Privacy Watch: A Latte, a Wi-Fi Link, and a Hacker That person sipping coffee at the next table could be hacking your log-in info as you type. |
BusinessWeek May 12, 2011 Riley & Vance |
Sony: The Company That Kicked the Hornet's Nest Security experts say Sony should have recognized the warning signs of an impending attack, which compromised 100 million accounts. |
Salon.com August 29, 2001 Damien Cave |
How do you fix a leaky Net? Brian West says he was doing a public service when he pointed out a security hole in an Oklahoma newspaper's Web site. So why did the editor in chief call the cops? |
Wired December 2004 Annalee Newitz |
They've Got Your Number ... Why spam, scams, and viruses are coming soon to a phone near you. |
CIO December 16, 2009 Robert McMillan |
Five Things You Need to Know About Social Engineering How hackers can steal your data. |
The Motley Fool June 13, 2011 Arunava De |
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. |
The Motley Fool December 5, 2010 Dean Takahashi. |
WikiLeaks Reveals How Google Was Targeted in China Documents lay bare vast hacking attempts by Chinese leaders. |
Scientific American September 2006 Tom Leighton |
The Net's Real Security Problem Forget "phishing" for bank account passwords. The deepest threats to online security are the weaknesses in the fundamental protocols that run the Internet. |
Fast Company Neal Ungerleider |
China Allegedly Arrested Hackers To Comply With The U.S. Government's Demands Whether China will actually prosecute the hackers is a whole other issue; it's possible the country only made the arrests to skirt the economic sanctions that President Obama was lording over China. |
CIO August 29, 2011 Robert McMillan |
Five Things CIOs Need to Know about Anonymous The hacking collective dubbed Anonymous has unleashed its brand of pesky "operations" on companies from Visa to Sony. Here are the top five things you need to know about their antics. |
IEEE Spectrum April 2006 Paul McFedries |
Gone Phishin' Microsoft is right to include antiphishing technology in Internet Explorer 7, because clearly we need all the help we can get. |