Attention B2B Marketers: Access 30 Million IT Decision Makers with a Custom Lead Generation Program Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com

Results 1-20 of 1319 for hacker (0.002 secs).

Searching: Articles | Discussions

Sort by Date | Sort by Relevance

John P. Mello Jr.
Risky Scripts Pose Threat to Web Surfers, Say Researchers
11/28/17 11:24 AM PT | TechNewsWorld | 1166 Words

That makes the playback page vulnerable to a man-in-middle attack that could suck all the data from the page and into a hacker's hands.

What's more, some services don't use HTTPS to communicate with their clients, which exposes the transmissions to...

Jack M. Germain
RoboCyberWall Aims to Block Linux Server Hacks
10/04/17 4:30 PM PT | LinuxInsider | 825 Words

The product's Modular Security paradigm for Linux server perimeters has been hacker tested for more than a year. It is far more secure than yesterday's all-in-one firewalls, according to the company, which describes them as "Jack of All Trades, Master of None."...

Jonathan Terrasi
Linux: Come for the Kernel, Stay for the Popcorn
09/20/17 3:22 PM PT | LinuxInsider | 921 Words

One example of this is the predominantly Linux-focused podcast Hacker Public Radio . The series has no designated host, instead calling on listeners to submit episodes for the benefit of the rest of the audience.

In this way, community members don't merely...

James Hollander
Analysis: Hacker Attack on Yahoo! Points Out Biggest E-Commerce Weakness
02/08/00 12:00 AM PT | E-Commerce Times | 684 Words

... of the most popular Internet content and commerce sites, Yahoo!, was taken down for three gut-wrenching hours on Monday by a malicious hacker attack . The cyber-assault was of a genre known as "denial-of-service," in which a Web site cannot function normally...

John P. Mello Jr.
'Hacker Madness' Strikes Idaho Judge
10/29/13 8:50 AM PT | TechNewsWorld | 1488 Words

... federal judge in Idaho appears to have had a fit of hacker madness. In a case involving a former employee and his bosses over software for protecting the nation's critical infrastructure from cyberattacks, federal district court Judge B. Lynn Winmill found the...

John P. Mello Jr.
Russian Hacker Gets a Taste of His Own Malware
10/31/12 10:52 AM PT | TechNewsWorld | 800 Words

... a persistent series of attacks on its government computers by a Russian hacker, the Republic of Georgia got mad and refused to take it anymore. The alleged hacker, caught on webcam.
Source: Georgian CERT team report

In a reversal of...

John P. Mello Jr.
Hacker Claims Old-School Tactic Brought GoDaddy to Its Knees
09/17/12 6:00 AM PT | TechNewsWorld | 1441 Words

Because of the size of GoDaddy, F-Secure Researcher Sean Sullivan was skeptical that a single hacker could make it go dark. "There are definitely botnets large enough to attack an operation such as GoDaddy," he told TechNewsWorld, "but generally, such large botnets...

Keith Regan
Hacker Insurance? Buy a Boatload
07/14/00 12:00 AM PT | E-Commerce Times | 835 Words

And now the company has done it again, creating a media splash with its announcement of insurance against hacker attacks. E-commerce companies should do some quick number crunching and order some up before Lloyd's comes to its senses.

Lloyd's partner in this...

Katherine Noyes
French Hacker Played Guessing Game to Access Twitter Accounts
03/26/10 9:35 AM PT | TechNewsWorld | 900 Words

... months of investigation by police and the FBI, a French hacker accused of breaking into the Twitter accounts of President Barack Obama and singer Britney Spears was arrested earlier this week. Francois Cousteix, a 25-year-old unemployed man from central France who is...

Renay San Miguel
The Hacker Journalists
08/28/09 8:30 AM PT | TechNewsWorld | 1468 Words

As mentioned in my last column , I don't think I'm what you would call a true hacker journalist in that I've never written any computer code and I'm not able to leap any programming obstacles in a single bound. And that's...

Susan B. Shor
Arrests Offer Glimpse Into Hacker Culture
08/31/05 11:30 AM PT | TechNewsWorld | 553 Words

The hacker underworld in which Essebar participated comprises numerous informational and networking resources -- and not all come from the world of virus writing and malware design .

"In general, black hats learn their tricks the same way that everybody else does:...

Jack M. Germain
Hacker Safe: The Security of Online Commerce
04/29/04 5:37 AM PT | TechNewsWorld | 949 Words

James Pappas, general manager of JL Hufford Coffee and Tea Company of Lafayette, Indiana, didn't wait around for credit card thefts or other hacker intrusions to strike his two-year-old Web site sales operation. He had his Web site audited and certified Hacker...

Jay Lyman
'Helpful Hacker' Adrian Lamo Faces Federal Charges
09/10/03 2:15 PM PT | TechNewsWorld | 688 Words

... 22-year-old computer hacker credited with breaking into more than a dozen networks owned by some of the largest companies in the world is facing federal charges of computer intrusion and unlawful use of passwords. Known as the "homeless hacker" for his laptop-only...

Chet Dembeck
List of Suspects in Hacker Attacks Narrows
02/14/00 12:00 AM PT | E-Commerce Times | 462 Words

... investigators and computer security experts have reportedly narrowed their search for the perpetrators of last week's denial-of-service (DoS) hacker attacks against some of the Internet's most popular Web sites down to at least two possible suspects. Law-enforcement officials have been attempting to...

John P. Mello Jr.
Hacker Posts Stolen Data on FBI, Homeland Security Employees Online
02/09/16 12:23 PM PT | TechNewsWorld | 601 Words

... U.S. departments of Justice and Homeland Security on Monday announced they were investigating reports that a hacker broke into government computer systems and stole sensitive information about employees at the agencies. The hacker posted stolen information for about 9,000 DHS employees online...

Richard Adhikari
Sony and the Rise of the Hacker Hordes
06/04/11 5:00 AM PT | TechNewsWorld | 893 Words

There's speculation that these attacks are being launched in retaliation for Sony's actions against hacker George Hotz, whom Sony sued for jailbreaking the PlayStation 3 and publishing the tools and techniques he used to do so on the Web.

As part...

Jay Lyman
One Hacker Sentenced, Another Indicted
07/19/04 1:19 PM PT | TechNewsWorld | 561 Words

... prominent computer hacker has been sentenced and a suspected hacker was indicted in the past week, both of them saying their cyber exploits were designed to point out security deficiencies. Infamous hacker Adrian Lamo, 23, who was known as "the helpful hacker"...

By Chet Dembeck
One Year Ago: E-Commerce Sites Crippled by Hacker Sabotage
02/08/01 6:01 PM PT | E-Commerce Times | 730 Words

Just one day after a hacker attack on Yahoo! shut the giant portal down for several hours, several leading e-tail sites were similarly affected by what appears to be an orchestrated, Web-wide act of sabotage.

At last count Tuesday, Amazon.com, Buy.com and...

Chet Dembeck
E-Commerce Sites Crippled by Hacker Sabotage
02/09/00 12:00 AM PT | E-Commerce Times | 720 Words

... one day after a hacker attack on Yahoo! shut the giant portal down for several hours, several leading e-tail sites were similarly affected by what appears to be an orchestrated, Web-wide act of sabotage. At last count Tuesday, Amazon.com, Buy.com and online...

Rachelle Dragani
Hacker Invades Baby Monitor in Texas Home
08/15/13 12:14 PM PT | TechNewsWorld | 672 Words

... hacker was able to gain access to a baby monitor on Saturday night, terrifying a Texas couple as they heard the virtual intruder speak offensively to their sleeping daughter. The parents use an Internet-connected baby monitor that is equipped with a camera...

1 2 3 4 5 6 Next

Search for: In:

Facebook Twitter LinkedIn Google+ RSS
What is the most consequential impact of social media on society today?
It has opened up valuable new channels for civil discourse.
It has destroyed the meaning of "truth" and "fact."
It has made people stronger by facilitating grass roots activism.
It has deepened divisions among groups with opposing views.
It has made it easier for people to support and help each other.
It has made it easier for people to humiliate and hurt each other.