Attention B2B Marketers: Access 30 Million IT Decision Makers with a Custom Lead Generation Program Click to Learn More!
Welcome Guest | Sign In

Results 101-120 of 1320 for hacker (0.002 secs).

Searching: Articles | Discussions

Sort by Date | Sort by Relevance

Stefani Robles
Daily Cybercrime and Security Report for May 4, 2001
05/04/01 1:30 AM PT | E-Commerce Times | 379 Words

"A Brazilian hacker crew that apparently has a grudge against Microsoft Corp. has defaced four Web sites connected to the company in the past two days..."

* * *

"The most recent vandalism was still live on the MSNBC Sports scoreboard site as of 10...

Elizabeth Blakey
Daily Cybercrime and Security Report for May 3, 2001
05/03/01 11:45 AM PT | E-Commerce Times | 371 Words

Ananova: Germany Wants Big Business to Help Win Hacker War
03-May-01 05:12:36 ET

Story Highlights:
"The German Government is to seek the help of the private sector in its bid to improve security on the web...."

* * *

"They say urgent measures...

Courtesy of
Daily Cybercrime and Security Report
04/23/01 11:14 AM PT | E-Commerce Times | 389 Words

Chicago Tribune: Law Not on Side of Ameritech Hacker
23-Apr-01 00:42:59 ET

Story Highlights:
"Earlier this month when a Michigan computer hacker accessed information about customers' phone bills from Ameritech's Web site , he publicized the security breach and was...

Lori Enos
Egghead Hacked and Cracked
12/22/00 12:32 PM PT | E-Commerce Times | 408 Words

... products e-tailer (Nasdaq: EGGS) said Friday that a hacker has breached its computer systems and may have gained access to its customer database . The company added that it has retained the "world's leading computer security experts" to investigate the breach...

Daily Cybercrime and Security Report
12/14/00 11:42 AM PT | E-Commerce Times | 675 Words

Nando Times: 55,000 Credit Card Numbers Stolen, Posted By Hacker
14-Dec-00 01:11:01 ET

Story Highlights:
"A hacker penetrated an Internet company's database of credit card numbers and posted more than 55,000 of them to a Web site when his ransom demands...

Chet Dembeck
Clinton Backs New Internet Security Center
02/15/00 12:00 AM PT | E-Commerce Times | 462 Words

... the investigation into last week's denial-of-service (DoS) hacker attacks narrows its focus today, U.S. President Bill Clinton is expected to propose a new Internet security center at a meeting with high-tech executives. According to a planning document, the new Cyber-National Information Center,...

Rob Conlin
CyberCash Denies Fault in Security Breach Case
01/11/00 12:00 AM PT | E-Commerce Times | 574 Words

... coming under heavy scrutiny for an alleged software failure that allowed an unidentified hacker to purloin and publish confidential credit card information on the Internet , CyberCash has issued a terse statement denying that its product contributed in any way to the...

Matthew Beale
Technology Spotlight: E-Commerce Security
11/24/99 12:00 AM PT | E-Commerce Times | 2158 Words

It's not the hacker listening to the information over the wire that's the issue. It's someone inside the company that happens to know all the credit card numbers live on that server and they're all in the clear, versus the hacker that...

John P. Mello Jr.
Hackers Claim Credit for Pokemon Go No-Go
07/19/16 12:38 PM PT | TechNewsWorld | 678 Words

Pokemon Go , the augmented reality game that has become an overnight sensation, experienced sluggish performance over the weekend, possibly from a hacker attack on its login servers. Shortly after Pokemon Go devs tweeted that the game was rolling out to 26 additional...

Richard Adhikari
UK Police Pinch Suspect in VTech Hack
12/16/15 11:49 AM PT | E-Commerce Times | 621 Words

Kids' profiles on VTech listed only their names, genders and birthdates, VTech said, but someone claiming to be the hacker told Motherboard he obtained the kids' head shots and chat logs.

"Even the name, gender or birthday of children in the...

Katherine Noyes
Android L Will Keep Your Secrets Safer
09/19/14 2:09 PM PT | TechNewsWorld | 747 Words

Multifactor authentication is one example, he told TechNewsWorld: "For instance, even if the hacker knows your iPhone password, does he also have your fingerprint to unlock the device? Or ... is the Apple watch currently connected to the device?"

In addition,...

David Vranicar
Up, Up and Away: Google Balloons to Beam Internet Access
06/17/13 8:55 AM PT | TechNewsWorld | 537 Words

Hacker Publishes Phone Numbers for Philippine President
A hacker apparently linked with the hacker collective Anonymous published three mobile phone numbers purportedly belonging to the Philippine president, Benigno Aquino III.

The numbers, published on the hacker's Facebook page, were...

Erika Morphy
Hackers: The Flies in Social Media Marketing Ointment
02/25/13 5:00 AM PT | CRM Buyer | 620 Words

Zendesk Breached
A hacker penetrated Zendesk's network last week and -- unbeknownst to its administrators -- accessed the accounts of three of its clients, the company acknowledged.

The hacker had access to the support systems those clients store in...

John P. Mello Jr.
Feds Back Projects to Bolster Online ID Verification
09/24/12 5:00 AM PT | TechNewsWorld | 1271 Words

There's only a million possible combinations for such a password, which would be child's play for a hacker to crack, he maintained.

Worse yet, Virgin did not have a limit on the number of consecutive unsuccessful tries that could be entered at...

Richard Adhikari
How Secure Is the Cloud, Really?
08/28/12 5:00 AM PT | TechNewsWorld | 861 Words

Through the clever use of social engineering, a hacker was able to wreak havoc on the Wired journalist's digital life . Apparently, the hacker talked Amazon tech support into providing the last four digits of Honan's credit card number. This information was then...

Richard Adhikari
NSA to Hackers: A Little Help?
07/30/12 11:37 AM PT | TechNewsWorld | 674 Words

Speaking at the DEFCON 2012 security conference, Alexander said the hacker community and the U.S. government cybercommunity share some core values.

"At DEFCON 20, Gen. Alexander discussed shared challenges and shared responsibilities in cyberspace," NSA spokesperson Vanee Vines told TechNewsWorld. "He also...

John P. Mello Jr.
The Case Of The Android Botnet
07/23/12 6:00 AM PT | TechNewsWorld | 1248 Words

Apple Plugs Hole
Apple acted quickly to address a glitch in its in-app purchasing technology that allowed users to buy items from its iTunes store for free, with the help of a Russian hacker.

Apple added a unique...

Richard Adhikari
Symantec Tells Customers to Pull the Plug on pcAnywhere Following Code Theft
01/26/12 12:13 PM PT | TechNewsWorld | 672 Words

Symantec is sounding the alarm for users of its pcAnywhere remote access software following threats from a hacker. In some cases, said the security software maker, they might want to turn off and disable the application entirely. The hacker, who goes by...

Richard Adhikari
DefCon Welcomes Kids: Hacking Fun for Everyone
08/08/11 11:56 AM PT | TechNewsWorld | 449 Words

... twenty-somethings arrested by the FBI in July on suspicion of partaking in criminal activities tied to the Anonymous hacker community may soon be regarded as geriatrics. The first annual hacker conference for kids, DefCon Kids , was held in Las Vegas last...

Richard Adhikari
LulzSec Heads for the Hills, Anon Hacks On
06/27/11 11:54 AM PT | TechNewsWorld | 474 Words

... hacker group LulzSec has apparently decided to shut down operations and sail off into the sunset. Fellow hacker community Anonymous, with which LulzSec has teamed up, may take up where LulzSec left off.

"We can confirm that all @LulzSec members have...

Previous 1 2 3 4 5 6 7 8 9 10 11 Next

Search for: In:

Facebook Twitter LinkedIn Google+ RSS
Which capabilities in a home robot might induce you to consider buying one?
Help with daily housecleaning chores
Companionship for elderly or disabled family member
Entertaining and educating children
Monitoring security all through the house
Keeping inventory and restocking items when needed
Nothing would persuade me to consider getting a home robot.