Attention B2B Marketers: Access 30 Million IT Decision Makers with a Custom Lead Generation Program Click to Learn More!
Welcome Guest | Sign In

Results 41-60 of 1319 for hacker (0.002 secs).

Searching: Articles | Discussions

Sort by Date | Sort by Relevance

Erika Morphy
Hacker Claims to Have Cracked Next Gen DRM Standard
12/29/06 1:11 PM PT | TechNewsWorld | 666 Words

... hacker who calls himself Muslix64 has Hollywood and music studios on edge this New Year's Eve weekend as they wait to see whether their latest digital rights management software standard will work as designed. Muslix64 has posted on the Internet the tools...

Jay Lyman
Hacker Cracks, Clones RFID Passport
08/07/06 3:10 PM PT | TechNewsWorld | 533 Words

... wireless data transfer capabilities of radio frequency identification (RFID) tags are intended to speed and assist transactions, but it appears the RFID chips of new U.S. passports are speeding and assisting circumvention, according to a German expert's demonstration at last week's Black Hat hacker ...

Jennifer LeClaire
Source Code Club: Hacker Hoax or Cisco Headache?
11/03/04 3:38 PM PT | E-Commerce Times | 391 Words

The anonymous hacker group began peddling proprietary source code last July, disappeared, and now has reemerged with a bargain basement deal of US$24,000 for the source code for Cisco's Pix security firewall . "SCC is proud to announce the general availability of Cisco...

Tiernan Ray
Think Like a Hacker - The Best Scanning Tools
11/26/03 4:01 AM PT | E-Commerce Times | 1912 Words

A new set of tools, collectively called vulnerability assessment, is educating sysadmins about ways to close holes in networks before a hacker even finds them, let alone plans an attack . With widely circulating estimates claiming that up to 90 percent of computer...

Tiernan Ray
Think Like a Hacker: The Best Scanning Tools
08/16/03 1:00 AM PT | E-Commerce Times | 1912 Words

A new set of tools, collectively called vulnerability assessment, is educating sysadmins about ways to close holes in networks before a hacker even finds them, let alone plans an attack . With widely circulating estimates claiming that up to 90 percent of computer...

Keith Regan
Web Sites on Alert for Hacker Contest
07/03/03 10:54 AM PT | E-Commerce Times | 522 Words

Web sites, not as a result of anti-American sentiment, but instead because of a purported contest among domestic hackers. "The Defacers Challenge" reportedly is a race to see which computer hacker can be the first to deface 6,000 different Web sites in a...

Michael Mahoney
Welsh Credit Card Hacker Avoids Jail Sentence
07/06/01 9:57 PM PT | E-Commerce Times | 491 Words

... self-proclaimed "Saint of E-Commerce," a 19-year-old Welsh teenage hacker named Raphael Gray, was sentenced Friday in a Wales court to three years of psychiatric and community service rehabilitation for posting the hacked credit card details of thousands of people to the Web,...

Chet Dembeck
One Year Ago: Latest Hacker Attack Cripples Online Brokerage
02/26/01 4:11 PM PT | E-Commerce Times | 573 Words

In what has become a persistent problem for popular Internet sites of late, the National Discount Brokers Group reported that its stock-trading Web site was shut down for more than an hour Thursday as a result of an apparent denial-of-service (DoS) hacker assault.

Keith Regan
Former Hacker Saves Strapped E-tailer
01/26/01 10:42 AM PT | E-Commerce Times | 480 Words

... white knight who pulled European e-tailer from the brink of bankruptcy at the last minute this week is a convicted hacker turned venture capitalist, a UK newspaper reported Thursday. The Manchester Guardian reported that a German venture fund that supplied US$2.3...

Lori Enos
Hacker Attacks Dampening E-Commerce Enthusiasm
03/07/00 12:00 AM PT | E-Commerce Times | 581 Words

Although online shoppers love a bargain, the recent spate of hacker attacks has shaken consumer confidence. The latest @plan Internet poll shows that almost 40 percent of Internet shoppers aged 18 and over are less likely to make a purchase online in...

Matthew Beale
Hacker Alert for Major Operating System Users
08/16/99 12:00 AM PT | E-Commerce Times | 473 Words

A hacker -- or cracker, in currently correct terms -- can essentially sit in between a user and an end host, in what is called a "man in the middle" attack , acting as a proxy to receive unencrypted data . L0pht says...

John P. Mello Jr.
Hot Hacker Targets in 2016: Fantasy Sports, Professional Services
12/15/15 7:00 AM PT | TechNewsWorld | 1533 Words

Hacker Attacks Will Increase Use of SSL
Encryption can keep online transactions secure, but it also can be used to mask criminal activity. That activity will increase in 2016 as the amount of traffic using SSL encryption increases.


David Vranicar
UK Blocks Extradition of UFO-Seeking Hacker
10/17/12 9:12 AM PT | TechNewsWorld | 592 Words

... McKinnon, a 46-year-old British computer hacker who admits to accessing U.S. government computers in 2002, will not be extradited to the U.S. According to the BBC , the UK home secretary, Theresa May, said that McKinnon is "seriously ill" and that the...

Richard Adhikari
Two-Headed Hacker Monster Declares Open Season on Governments
06/20/11 3:02 PM PT | TechNewsWorld | 671 Words

... ad hoc hacker communities often in the headlines of late -- LulzSec and Anonymous -- announced on Monday they intend to team up to attack government websites worldwide. In its "Operation Anti-Security" manifesto , LulzSec said the top priority of this operation...

Paul Hartsock
The Sony Horror Hacker Show
05/07/11 5:00 AM PT | TechNewsWorld | 2339 Words

Sony also explained that one of the reasons its security system was off the ball at the time of the attack was because it had recently been targeted by the hacktivist group Anonymous in retaliation for the company's lawsuit against hacker George...

Richard Adhikari
Hacker Shows How Cloud Could Wash Out Wireless Security
01/11/11 3:08 PM PT | TechNewsWorld | 817 Words

... hacker Thomas Roth's announcement that he used's cloud service to crack a wireless network security standard has left some security researchers scratching their heads. Others are merely shaking them in disbelief. That attack was launched against the SHA-1 hash algorithm.


Erika Morphy
Judge Imposes Stiff Sentence on Heartland Hacker
03/26/10 12:19 PM PT | E-Commerce Times | 610 Words

District Judge Patti Saris sentenced computer hacker Albert Gonzalez to 20 years in prison for his role in stealing 40 million debit and credit card numbers that resulted in an economic loss of US$200 million, according to the U.S. government's best estimate. The...

Walaika Haskins
Whippersnapper Hacker Springs Touch From Apple Slammer
10/15/07 1:50 PM PT | TechNewsWorld | 837 Words

However, a hacker barely in his teens has claimed he's already cooked up a code called "iJailbreak" that will allow touch users to load their devices with third-party applications. As an added bonus, the program apparently does its job for anyone interested in...

Katherine Noyes
UFO-Seeking British Hacker May Face US Trial
04/03/07 11:00 AM PT | TechNewsWorld | 465 Words

'Serious Transgressions'
"This is a sad situation for a hacker," technology attorney Raymond Van Dyke told TechNewsWorld. "His timing, around 9/11 and its aftermath, and very sensitive targets, numerous military computer systems no less, were serious transgressions.


Jennifer LeClaire
Anti-Phishing Firm Hires Infamous Hacker
08/10/05 5:00 AM PT | TechNewsWorld | 898 Words

... do you do if you need to prove your software is virtually hack-proof? Well, you could always hire a renowned former hacker to attempt to foil the system and mount a successful phishing attack . That's just what 41st Parameter did.


Previous 1 2 3 4 5 6 7 8 Next

Search for: In:

Facebook Twitter LinkedIn Google+ RSS
Of the following CES 2018 crowd pleasers, which do you consider the most important or desirable new tech?
Google Assistant -- voice-activated AI on displays everywhere
Helite's Hip'Air - a hip-protecting airbag belt for seniors
HTC Vive Pro - a VR headset with way better resolution and sound
Samsung's 'The Wall' - a modular TV with MicroLED for consumers
Sony's Aibo -- a lovable AI-powered robotic pet dog
Toyota's e-Palette -- a self-driving van for deliveries and more