Attention B2B Marketers: Access 30 Million IT Decision Makers with a Custom Lead Generation Program Click to Learn More!
Welcome Guest | Sign In

Results 21-40 of 1327 for hacker (0.002 secs).

Searching: Articles | Discussions

Sort by Date | Sort by Relevance

Ryan Corey
Certified Ethical Hacker: Not Your Everyday Job
10/07/09 8:39 AM PT | TechNewsWorld | 988 Words

An individual that is trained as a Certified Ethical Hacker (CEH) is often employed by a private or public network security company or department that works with private businesses, government agencies and even the military. As computers advance, the Internet evolves and networks...

Mary Hillebrand
Clinton Outlines Plan for Hacker Counter-Attack
02/17/00 12:00 AM PT | E-Commerce Times | 986 Words

... a brief meeting with supporters from the computing community this week, President Bill Clinton laid out a plan for the U.S. government to respond to the national security threat that has been highlighted over the past two weeks by hacker attacks on...

John P. Mello Jr.
Anonymous Hacker Pulls Plug on Thousands of Dark Net Sites
02/07/17 11:15 AM PT | TechNewsWorld | 688 Words

... percent of the Dark Net was taken offline last week, when a hacker compromised a server hosting some 10,000 websites on the Tor network. Tor, designed to hide the identities of its users, is widely used on the Dark Web, which isn't...

Renay San Miguel
China Plays Up Hacker Crackdown
02/08/10 12:10 PM PT | E-Commerce Times | 765 Words

Chinese police are trumpeting their shutdown of a major hacker training Web site and three related arrests. However, on the same day, Google claimed that the logo of a copycat Web site based in China looks a little too much like its now-familiar...

Jennifer LeClaire
Hacker Accesses Secret Service, T-Mobile Customer Files
01/17/05 9:34 AM PT | E-Commerce Times | 524 Words

... hacker broke into wireless carrier T-Mobile's server systems network over at least seven months and read e-mails and personal computer files of the U.S. Secret Service, along with hundreds of other customers, the government has announced. Security experts said this is the...

Mick Brady
Have You Hugged a Hacker Today?
08/29/00 12:00 AM PT | E-Commerce Times | 1124 Words

There are a lot of people who think that a fallen anti-hero, like convicted hacker Kevin Mitnick, should have a few appendages removed to keep him from ever again committing a computer crime. Less extreme, more popular opinions range from forever barring him...

Chet Dembeck
Teen Hacker Arrest Masks True Net Peril
04/20/00 12:00 AM PT | E-Commerce Times | 523 Words

... past weekend, a Canadian teen who calls himself "Mafiaboy" was arrested in the Montreal area and charged with at least one of the February denial-of-service (DoS) hacker attacks that blocked access to such popular Web sites as Yahoo!, Amazon and eBay. In...

Jack M. Germain
The Novena Open Hardware Laptop: A Hacker's Dream Machine
07/03/14 10:10 AM PT | LinuxInsider | 1910 Words

The laptop design includes everything a hands-on computer hacker would want to enhance and use his equipment, according to Huang and Cross.

Their reference to "hacker" refers to computer hobbyists who make innovative customizations to computer equipment.

The two decided to...

Richard Adhikari
Judge Throws the Book at AT&T Hacker 'Weev'
03/18/13 4:17 PM PT | TechNewsWorld | 652 Words

... Auernheimer, a hacker known as "Weev," was sentenced Monday to 41 months in prison for obtaining the personal data of more than 100,000 iPad owners from AT&T's publicly accessible website and sending the information to the media. The ruling immediately sparked an...

Lori Enos
Hacker Breaches Payments Site
08/28/01 10:31 PM PT | E-Commerce Times | 547 Words

... payments provider Ecount confirmed to the E-Commerce Times on Monday night that a hacker or hackers breached security at its Web payment site , . "We have reason to believe someone inappropriately accessed data," Ecount chief executive officer and president Matt...

Lori Enos
Lloyd's of London To Offer Hacker Insurance
07/10/00 12:00 AM PT | E-Commerce Times | 668 Words

The cyber-damage protection portion covers the cost to repair and replace data and/or software to the same standard following a hacker attack that damages, destroys, alters, corrupts or otherwise misuses the customer's electronic devices.

The revenue protection portion covers financial losses following...

Chet Dembeck
Latest Hacker Attack Cripples Online Brokerage
02/25/00 12:00 AM PT | E-Commerce Times | 566 Words

... what has become a persistent problem for popular Internet sites of late, the National Discount Brokers Group reported that its stock-trading Web site was shut down for more than an hour Thursday as a result of an apparent denial-of-service (DoS) hacker assault.

Mary Hillebrand
Report: Women E-Shoppers Most Troubled by Hacker Attacks
02/17/00 12:00 AM PT | E-Commerce Times | 526 Words

... research data shows that women who regularly shop online are much more concerned than men about the safety of e-commerce after the recent spate of hacker attacks on such well known sites as eBay, Yahoo!, and CNN. The poll data, from the...

Richard Adhikari
Hacker Hawks 2-Year-Old Cache of 117M LinkedIn User IDs
05/23/16 8:37 AM PT | E-Commerce Times | 546 Words

... hacker has offered to sell the account information of 117 million LinkedIn users, which was stolen in a 2012 hack, Motherboard reported last week. The data includes users' email addresses and passwords.

The hacker, who goes by the handle "Peace," reportedly...

John P. Mello Jr.
Hacker Demos $30 Gizmo That Unlocks Keyless Car, Garage Doors
08/11/15 5:00 AM PT | TechNewsWorld | 730 Words

The individual remains unknowing that a hacker has captured the second code and can later use it to open the vehicle or garage.

Foiled by Fast Expiration
RollJam works with a wide array of motor vehicles -- Nissan, Cadillac, Ford,...

Peter Suciu
Crowds Cough Up More Than $12K for Facebook Hacker
08/22/13 3:34 PM PT | TechNewsWorld | 647 Words

... hacker who uncovered a bug on Facebook earlier this week may indeed get a reward for his efforts, but not from the social network itself. After it became clear that Facebook would not pay Khalil Shreateh a bug bounty for his discovery,...

Richard Adhikari
No Bounty for Zuckerberg Page Hacker, Facebook Says
08/20/13 9:32 AM PT | TechNewsWorld | 608 Words

Facebook decided against paying Shreateh the bounty, explaining on Hacker News that this was because Shreateh had violated its terms of service by posting items to the Facebook pages of users he should not have had access to.

Shreateh later posted...

Richard Adhikari
Hacker Exploits a Loophole to Score Free App Goodies
07/14/12 5:00 AM PT | TechNewsWorld | 658 Words

... Russian hacker has worked out a way to make in-app purchases from iOS apps without paying. The hacker, who goes by the handle "ZonD," has set up a website explaining the exploit and has urged Apple to contact him.

ZonD asks...

Richard Adhikari
Not Much Hyperventilating Over Hacker's Hypervisor Code Theft
04/26/12 2:28 PM PT | TechNewsWorld | 587 Words

... hacker with the handle "Hardcore Charlie" has stolen source code for VMware's ESX hypervisor and posted it on the Internet. A hypervisor provides a virtualization layer between operating systems and the underlying hardware, creating a virtual machine (VM). This lets users run...

Rob Spiegel
Hacker Chatter Suggests Thieves Have Millions of PSN Customers' Credit Cards
04/29/11 11:40 AM PT | TechNewsWorld | 714 Words

One hacker admitted trying to sell a list to Sony but did not receive a response. Multiple researchers have confirmed the underground discussions but could not verify the possession of stolen database information.

Sony: It's Possible
On many forums, PlayStation...

Previous 1 2 3 4 5 6 7 Next

Search for: In:

Facebook Twitter LinkedIn Google+ RSS
Freshsales - Don't fall prey to Excel sheets
What best describes your attitude toward social networks and politics?
The value of engaging in serious political discourse outweighs the negatives.
Most of the political conversations seem overheated and ignorant.
Social networks provide a lot of very good political information from reliable sources.
Almost every political post I see is skewed or totally fake.
Political interactions on social networks simply mirror those in the real world.
Social networks remove inhibitions, bringing out the worst in people and politics.