The largest repository of hacker activity and vulnerability data on display » Get the Report from HackerOne!
Welcome Guest | Sign In

Results 101-120 of 1327 for hacker (0.002 secs).

Searching: Articles | Discussions

Sort by Date | Sort by Relevance

Elizabeth Blakey
Daily Cybercrime and Security Report for June 18, 2001
06/18/01 11:40 AM PT | E-Commerce Times | 389 Words

ComputerUser: Hacker Turns RTF Exploit Theory into Reality
16-Jun-01 04:55:44 ET

Story Highlights:
"An anti-virus company say that at least one hacker has released rogue code that takes advantage of a recently uncovered security hole in Microsoft Word's handling of...

Elizabeth Blakey
Daily Cybercrime and Security Report for May 30, 2001
05/30/01 11:18 AM PT | E-Commerce Times | 382 Words

The Register: @Home's Mis-Configured Proxy Excites Hacker
29-May-01 14:33:33 ET

Story Highlights:
"A single misconfigured server exposed broadband provider Excite@Home's internal corporate network to hackers for at least three months..."

* * *

"An Excite@Home spokesperson confirmed that the company recently shut down...

Stefani Robles
Daily Cybercrime and Security Report for May 4, 2001
05/04/01 1:30 AM PT | E-Commerce Times | 379 Words

"A Brazilian hacker crew that apparently has a grudge against Microsoft Corp. has defaced four Web sites connected to the company in the past two days..."

* * *

"The most recent vandalism was still live on the MSNBC Sports scoreboard site as of 10...

Elizabeth Blakey
Daily Cybercrime and Security Report for May 3, 2001
05/03/01 11:45 AM PT | E-Commerce Times | 371 Words

Ananova: Germany Wants Big Business to Help Win Hacker War
03-May-01 05:12:36 ET

Story Highlights:
"The German Government is to seek the help of the private sector in its bid to improve security on the web...."

* * *

"They say urgent measures...

Courtesy of
Daily Cybercrime and Security Report
04/23/01 11:14 AM PT | E-Commerce Times | 389 Words

Chicago Tribune: Law Not on Side of Ameritech Hacker
23-Apr-01 00:42:59 ET

Story Highlights:
"Earlier this month when a Michigan computer hacker accessed information about customers' phone bills from Ameritech's Web site , he publicized the security breach and was...

Lori Enos
Egghead Hacked and Cracked
12/22/00 12:32 PM PT | E-Commerce Times | 408 Words

... products e-tailer (Nasdaq: EGGS) said Friday that a hacker has breached its computer systems and may have gained access to its customer database . The company added that it has retained the "world's leading computer security experts" to investigate the breach...

Daily Cybercrime and Security Report
12/14/00 11:42 AM PT | E-Commerce Times | 675 Words

Nando Times: 55,000 Credit Card Numbers Stolen, Posted By Hacker
14-Dec-00 01:11:01 ET

Story Highlights:
"A hacker penetrated an Internet company's database of credit card numbers and posted more than 55,000 of them to a Web site when his ransom demands...

Chet Dembeck
Clinton Backs New Internet Security Center
02/15/00 12:00 AM PT | E-Commerce Times | 462 Words

... the investigation into last week's denial-of-service (DoS) hacker attacks narrows its focus today, U.S. President Bill Clinton is expected to propose a new Internet security center at a meeting with high-tech executives. According to a planning document, the new Cyber-National Information Center,...

Rob Conlin
CyberCash Denies Fault in Security Breach Case
01/11/00 12:00 AM PT | E-Commerce Times | 574 Words

... coming under heavy scrutiny for an alleged software failure that allowed an unidentified hacker to purloin and publish confidential credit card information on the Internet , CyberCash has issued a terse statement denying that its product contributed in any way to the...

Matthew Beale
Technology Spotlight: E-Commerce Security
11/24/99 12:00 AM PT | E-Commerce Times | 2158 Words

It's not the hacker listening to the information over the wire that's the issue. It's someone inside the company that happens to know all the credit card numbers live on that server and they're all in the clear, versus the hacker that...

John P. Mello Jr.
Hackers Claim Credit for Pokemon Go No-Go
07/19/16 12:38 PM PT | TechNewsWorld | 678 Words

Pokemon Go , the augmented reality game that has become an overnight sensation, experienced sluggish performance over the weekend, possibly from a hacker attack on its login servers. Shortly after Pokemon Go devs tweeted that the game was rolling out to 26 additional...

Richard Adhikari
UK Police Pinch Suspect in VTech Hack
12/16/15 11:49 AM PT | E-Commerce Times | 621 Words

Kids' profiles on VTech listed only their names, genders and birthdates, VTech said, but someone claiming to be the hacker told Motherboard he obtained the kids' head shots and chat logs.

"Even the name, gender or birthday of children in the...

Katherine Noyes
Android L Will Keep Your Secrets Safer
09/19/14 2:09 PM PT | TechNewsWorld | 747 Words

Multifactor authentication is one example, he told TechNewsWorld: "For instance, even if the hacker knows your iPhone password, does he also have your fingerprint to unlock the device? Or ... is the Apple watch currently connected to the device?"

In addition,...

David Vranicar
Up, Up and Away: Google Balloons to Beam Internet Access
06/17/13 8:55 AM PT | TechNewsWorld | 537 Words

Hacker Publishes Phone Numbers for Philippine President
A hacker apparently linked with the hacker collective Anonymous published three mobile phone numbers purportedly belonging to the Philippine president, Benigno Aquino III.

The numbers, published on the hacker's Facebook page, were...

Erika Morphy
Hackers: The Flies in Social Media Marketing Ointment
02/25/13 5:00 AM PT | CRM Buyer | 620 Words

Zendesk Breached
A hacker penetrated Zendesk's network last week and -- unbeknownst to its administrators -- accessed the accounts of three of its clients, the company acknowledged.

The hacker had access to the support systems those clients store in...

John P. Mello Jr.
Feds Back Projects to Bolster Online ID Verification
09/24/12 5:00 AM PT | TechNewsWorld | 1271 Words

There's only a million possible combinations for such a password, which would be child's play for a hacker to crack, he maintained.

Worse yet, Virgin did not have a limit on the number of consecutive unsuccessful tries that could be entered at...

Richard Adhikari
How Secure Is the Cloud, Really?
08/28/12 5:00 AM PT | TechNewsWorld | 861 Words

Through the clever use of social engineering, a hacker was able to wreak havoc on the Wired journalist's digital life . Apparently, the hacker talked Amazon tech support into providing the last four digits of Honan's credit card number. This information was then...

Richard Adhikari
NSA to Hackers: A Little Help?
07/30/12 11:37 AM PT | TechNewsWorld | 674 Words

Speaking at the DEFCON 2012 security conference, Alexander said the hacker community and the U.S. government cybercommunity share some core values.

"At DEFCON 20, Gen. Alexander discussed shared challenges and shared responsibilities in cyberspace," NSA spokesperson Vanee Vines told TechNewsWorld. "He also...

John P. Mello Jr.
The Case Of The Android Botnet
07/23/12 6:00 AM PT | TechNewsWorld | 1248 Words

Apple Plugs Hole
Apple acted quickly to address a glitch in its in-app purchasing technology that allowed users to buy items from its iTunes store for free, with the help of a Russian hacker.

Apple added a unique...

Richard Adhikari
Symantec Tells Customers to Pull the Plug on pcAnywhere Following Code Theft
01/26/12 12:13 PM PT | TechNewsWorld | 672 Words

Symantec is sounding the alarm for users of its pcAnywhere remote access software following threats from a hacker. In some cases, said the security software maker, they might want to turn off and disable the application entirely. The hacker, who goes by...

Previous 1 2 3 4 5 6 7 8 9 10 11 Next

Search for: In:

Facebook Twitter LinkedIn Google+ RSS
What best describes your attitude toward social networks and politics?
The value of engaging in serious political discourse outweighs the negatives.
Most of the political conversations seem overheated and ignorant.
Social networks provide a lot of very good political information from reliable sources.
Almost every political post I see is skewed or totally fake.
Political interactions on social networks simply mirror those in the real world.
Social networks remove inhibitions, bringing out the worst in people and politics.