Attention B2B Marketers: Access 30 Million IT Decision Makers with a Custom Lead Generation Program Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com

Results 1-20 of 1326 for hacker (0.002 secs).

Searching: Articles | Discussions

Sort by Date | Sort by Relevance

John P. Mello Jr.
Def Con Voting Machine Hacks Ruffle Feathers
08/14/18 7:33 AM PT | E-Commerce Times | 1024 Words

One of the largest providers of election equipment in the United States, ES&S, sent an email to its customers advising them that it was highly unlikely that any hacker would be able to get the physical access to a voting machine that...

Jonathan Terrasi
Can Hackers Crack the Ivory Towers?
06/19/18 7:00 AM PT | LinuxInsider | 1011 Words

"In the academic community, it's all about getting tenure, and you do that by getting published in a subset of serious journals and speaking at a subset of what they call 'top conferences,'" she explained. "For the hacker world ... it could...

Jonathan Terrasi
DevOps: Plenty of Devs, Not Enough Ops
05/29/18 9:20 AM PT | LinuxInsider | 933 Words

In his presentation at the third iteration of the CypherCon hacker conference held last month in Milwaukee, Bryan described an anonymized engagement in which he probed the network of a development team responsible for 1.2 million user accounts. His purpose was to...

John P. Mello Jr.
FBI Declaws Russian Fancy Bear Botnet
05/25/18 5:00 AM PT | TechNewsWorld | 877 Words

The hacker group, known as "Fancy Bear," has been using a malware program called "VPN Filter" to compromise home and small office routers made by Linksys, MikroTik, Netgear and TP-Link, as well as QNAP network-attached storage devices.

VPN Filter is "particularly concerning"...

James Hollander
Analysis: Hacker Attack on Yahoo! Points Out Biggest E-Commerce Weakness
02/08/00 12:00 AM PT | E-Commerce Times | 684 Words

... of the most popular Internet content and commerce sites, Yahoo!, was taken down for three gut-wrenching hours on Monday by a malicious hacker attack . The cyber-assault was of a genre known as "denial-of-service," in which a Web site cannot function normally...

John P. Mello Jr.
'Hacker Madness' Strikes Idaho Judge
10/29/13 8:50 AM PT | TechNewsWorld | 1488 Words

... federal judge in Idaho appears to have had a fit of hacker madness. In a case involving a former employee and his bosses over software for protecting the nation's critical infrastructure from cyberattacks, federal district court Judge B. Lynn Winmill found the...

John P. Mello Jr.
Russian Hacker Gets a Taste of His Own Malware
10/31/12 10:52 AM PT | TechNewsWorld | 800 Words

... a persistent series of attacks on its government computers by a Russian hacker, the Republic of Georgia got mad and refused to take it anymore. The alleged hacker, caught on webcam.
Source: Georgian CERT team report

In a reversal of...

John P. Mello Jr.
Hacker Claims Old-School Tactic Brought GoDaddy to Its Knees
09/17/12 6:00 AM PT | TechNewsWorld | 1441 Words

Because of the size of GoDaddy, F-Secure Researcher Sean Sullivan was skeptical that a single hacker could make it go dark. "There are definitely botnets large enough to attack an operation such as GoDaddy," he told TechNewsWorld, "but generally, such large botnets...

Keith Regan
Hacker Insurance? Buy a Boatload
07/14/00 12:00 AM PT | E-Commerce Times | 835 Words

And now the company has done it again, creating a media splash with its announcement of insurance against hacker attacks. E-commerce companies should do some quick number crunching and order some up before Lloyd's comes to its senses.

Lloyd's partner in this...

Katherine Noyes
French Hacker Played Guessing Game to Access Twitter Accounts
03/26/10 9:35 AM PT | TechNewsWorld | 900 Words

... months of investigation by police and the FBI, a French hacker accused of breaking into the Twitter accounts of President Barack Obama and singer Britney Spears was arrested earlier this week. Francois Cousteix, a 25-year-old unemployed man from central France who is...

Renay San Miguel
The Hacker Journalists
08/28/09 8:30 AM PT | TechNewsWorld | 1468 Words

As mentioned in my last column , I don't think I'm what you would call a true hacker journalist in that I've never written any computer code and I'm not able to leap any programming obstacles in a single bound. And that's...

Susan B. Shor
Arrests Offer Glimpse Into Hacker Culture
08/31/05 11:30 AM PT | TechNewsWorld | 553 Words

The hacker underworld in which Essebar participated comprises numerous informational and networking resources -- and not all come from the world of virus writing and malware design .

"In general, black hats learn their tricks the same way that everybody else does:...

Jack M. Germain
Hacker Safe: The Security of Online Commerce
04/29/04 5:37 AM PT | TechNewsWorld | 949 Words

James Pappas, general manager of JL Hufford Coffee and Tea Company of Lafayette, Indiana, didn't wait around for credit card thefts or other hacker intrusions to strike his two-year-old Web site sales operation. He had his Web site audited and certified Hacker...

Jay Lyman
'Helpful Hacker' Adrian Lamo Faces Federal Charges
09/10/03 2:15 PM PT | TechNewsWorld | 688 Words

... 22-year-old computer hacker credited with breaking into more than a dozen networks owned by some of the largest companies in the world is facing federal charges of computer intrusion and unlawful use of passwords. Known as the "homeless hacker" for his laptop-only...

Chet Dembeck
List of Suspects in Hacker Attacks Narrows
02/14/00 12:00 AM PT | E-Commerce Times | 462 Words

... investigators and computer security experts have reportedly narrowed their search for the perpetrators of last week's denial-of-service (DoS) hacker attacks against some of the Internet's most popular Web sites down to at least two possible suspects. Law-enforcement officials have been attempting to...

John P. Mello Jr.
Hacker Posts Stolen Data on FBI, Homeland Security Employees Online
02/09/16 12:23 PM PT | TechNewsWorld | 601 Words

... U.S. departments of Justice and Homeland Security on Monday announced they were investigating reports that a hacker broke into government computer systems and stole sensitive information about employees at the agencies. The hacker posted stolen information for about 9,000 DHS employees online...

Richard Adhikari
Sony and the Rise of the Hacker Hordes
06/04/11 5:00 AM PT | TechNewsWorld | 893 Words

There's speculation that these attacks are being launched in retaliation for Sony's actions against hacker George Hotz, whom Sony sued for jailbreaking the PlayStation 3 and publishing the tools and techniques he used to do so on the Web.

As part...

Jay Lyman
One Hacker Sentenced, Another Indicted
07/19/04 1:19 PM PT | TechNewsWorld | 561 Words

... prominent computer hacker has been sentenced and a suspected hacker was indicted in the past week, both of them saying their cyber exploits were designed to point out security deficiencies. Infamous hacker Adrian Lamo, 23, who was known as "the helpful hacker"...

By Chet Dembeck
One Year Ago: E-Commerce Sites Crippled by Hacker Sabotage
02/08/01 6:01 PM PT | E-Commerce Times | 730 Words

Just one day after a hacker attack on Yahoo! shut the giant portal down for several hours, several leading e-tail sites were similarly affected by what appears to be an orchestrated, Web-wide act of sabotage.

At last count Tuesday, Amazon.com, Buy.com and...

Chet Dembeck
E-Commerce Sites Crippled by Hacker Sabotage
02/09/00 12:00 AM PT | E-Commerce Times | 720 Words

... one day after a hacker attack on Yahoo! shut the giant portal down for several hours, several leading e-tail sites were similarly affected by what appears to be an orchestrated, Web-wide act of sabotage. At last count Tuesday, Amazon.com, Buy.com and online...

1 2 3 4 5 6 Next

Search for: In:

Facebook Twitter LinkedIn Google+ RSS
What role will technology play in the upcoming U.S. midterm elections?
Advanced security measures will protect the legitimacy of the elections.
Inadequate security will place the election process at grave risk.
Voter technology is so decentralized, attackers can't have much impact.
Companies that manufacture voting machines need to shore up their security.
The upcoming midterms will be no better or worse than others from a tech standpoint.