Attention B2B Marketers: Access 30 Million IT Decision Makers with a Custom Lead Generation Program Click to Learn More!
Welcome Guest | Sign In

Results 61-80 of 1322 for hacker (0.002 secs).

Searching: Articles | Discussions

Sort by Date | Sort by Relevance

Katherine Noyes
UFO-Seeking British Hacker May Face US Trial
04/03/07 11:00 AM PT | TechNewsWorld | 465 Words

'Serious Transgressions'
"This is a sad situation for a hacker," technology attorney Raymond Van Dyke told TechNewsWorld. "His timing, around 9/11 and its aftermath, and very sensitive targets, numerous military computer systems no less, were serious transgressions.


Jennifer LeClaire
Anti-Phishing Firm Hires Infamous Hacker
08/10/05 5:00 AM PT | TechNewsWorld | 898 Words

... do you do if you need to prove your software is virtually hack-proof? Well, you could always hire a renowned former hacker to attempt to foil the system and mount a successful phishing attack . That's just what 41st Parameter did.


John P. Mello Jr.
Hacker Drills Hole in iTunes Security Blanket
11/25/03 7:11 AM PT | TechNewsWorld | 706 Words

And now a hacker of some repute -- Jon Lech "DVD Jon" Johansen, who at 15 invented DeCSS, a program that defeats the encryption scheme for DVD movies -- has unleashed QTFairUse, an application that can extract the contents of digitally-protected files,...

Alison Diana
How Much Is a Hacker's Head Worth?
11/19/03 3:44 AM PT | E-Commerce Times | 981 Words

Even if a hacker is taken seriously, developers or IT executives have no way of gauging the veracity of the vulnerability information, which can be a problem if they are being asked to pay for it. For their part, gray-hat hackers -- who...

Tim McDonald
Hacker, Critic Elected to Domain Name Board
10/11/00 12:00 AM PT | E-Commerce Times | 505 Words

... with three other members of the public, a German hacker and a vocal American critic of the domain name process have been elected to the board of directors of the Internet Corporation for Assigned Names and Numbers (ICANN), the group that oversees...

Paul A. Greenberg
Online Shoppers Not Swayed by Hacker Attacks
02/14/00 12:00 AM PT | E-Commerce Times | 521 Words

... the recent barrage of hacker attacks on high profile e-commerce sites, online shoppers have continued to buy products and services -- albeit more cautiously -- over the Internet . For those e-tailers that experienced a denial-of-service (DoS) attack , it may have...

Chet Dembeck
Latest Hacker Attacks Rattle E-Commerce
02/10/00 12:00 AM PT | E-Commerce Times | 660 Words

... Internet and e-commerce fell victim to a third full-scale hacker assault in as many days Wednesday, as online broker E*Trade and a number of other sites had traffic disrupted by a coordinated stream of data requests from multiple Internet addresses. These incidents...

Richard Adhikari
News Corp. Too Tempting a Target for LulzSec to Resist
07/19/11 12:22 PM PT | TechNewsWorld | 795 Words

... than a month after the hacker group LulzSec announced it was disbanding, it has apparently made a comeback with a massive attack on the websites of embattled media mogul Rupert Murdoch and his News Corp. empire. LulzSec -- or at least a...

Jack M. Germain
Hackers for Hire
02/13/04 5:28 AM PT | TechNewsWorld | 977 Words

But new threats of hacker intrusion, data theft and cyberterrorism have heightened concerns about network security . Increased government regulations regarding customer privacy and data security are testing business priorities. The result is the return of an old debate in boardrooms over...

Daily Cybercrime and Security Report
11/21/00 1:03 PM PT | E-Commerce Times | 868 Words

The Register: Solar Sunrise Hacker Joins Mid-East Cyber-War
21-Nov-00 11:55:53 ET

Story Highlights:
"The ongoing war of packet floods and Web defacements between pro-Israeli and pro-Palestinian hacktivists saw a new and famous name enter the fray last week: Ehud Tenebaum, the...

Stephen Caswell
Exclusive Interview: FBI Computer Crime Squad
02/10/00 12:00 AM PT | | 1659 Words

I've also noted older criminals hanging around the hacker community and using kids to do their dirty work.

As for the juveniles, many still do it for self-aggrandizement. I have two big concerns about that. First is the damage that is caused...

Richard Adhikari
Anon Lets Fly With Symantec Code After Ransom Talks Collapse
02/07/12 1:45 PM PT | TechNewsWorld | 715 Words

... hacker who was negotiating a ransom for stolen source code to a Symantec product released the data via peer-to-peer networks on Tuesday after negotiations fell through. The code is for security vendor Symantec's pcAnywhere remote access software.

Symantec had last month...

Paul Korzeniowski
Hackers Change Attack Modes, Seek Financial Payoff
04/07/06 5:00 AM PT | TechNewsWorld | 903 Words

... typical picture of a hacker has often been one of an introverted, misunderstood teen with a great deal of repressed anger. Launching an attack and disabling thousands of computers somehow seems to compensate for those feelings. Increasingly, however, while the hacker profile...

Paul Korzeniowski
Passwords Fail the Security Test
03/19/04 6:22 AM PT | TechNewsWorld | 1073 Words

The most common password attack is a frontal assault, during which a hacker uses automated hit-or-miss software to enter various user IDs and passwords until hitting upon a combination that works.

Numerous Web sites feature software programs that help hackers crack password...

Katherine Noyes
Hacking as a Service Hits the Mainstream
01/19/15 7:37 AM PT | E-Commerce Times | 671 Words

Nearly 50 hackers have listed their services on Hacker's List so far, for tasks including data recovery, penetration testing and computer forensics.

More than 500 hacking jobs had been out to bid as of last week, with prices ranging from US$100...

Jack M. Germain
Web Shoppers and Info Security: A Question of Credibility
07/16/07 4:00 AM PT | E-Commerce Times | 1192 Words

Measuring Safety
ScanAlert provides a Web site security auditing and certification service that certifies the security of e-commerce infrastructure to the Hacker Safe standard. The service combines daily vulnerability scanning of a Web site's complete e-commerce infrastructure and real-time certification...

Jack M. Germain
Experts See Sharp Rise in Malware Attack Probability
06/04/04 8:50 AM PT | TechNewsWorld | 1311 Words

... experts are warning that malware attacks will pose more of a major threat over the next three years than direct hacker attacks. The British mi2g Intelligence Unit claimed this week that the malware risk has risen from 1 in 40 last year...

Elizabeth Blakey
One Year Ago: Commit a Cybercrime? You're Hired!
07/16/01 5:29 PM PT | E-Commerce Times | 942 Words

Mitnick's lawyer praised the probation office's recent move because it was an 180-degree reversal of its prior decision refusing the former hacker's request to work in the computer industry. The reversal of fortune came only after Mitnick obtained a court ruling...

Elizabeth Blakey
Commit a Cybercrime? You're Hired!
07/17/00 12:00 AM PT | E-Commerce Times | 932 Words

Mitnick's lawyer praised the probation office's recent move because it was an 180-degree reversal of its prior decision refusing the former hacker's request to work in the computer industry. The reversal of fortune came only after Mitnick obtained a court ruling...

Jonathan Terrasi
Hacking and Linux Go Together Like 2 Keys in a Key Pair
05/31/17 3:16 PM PT | LinuxInsider | 1084 Words

... since taking an interest Linux , with the specific aim of better understanding and enhancing my personal digital security, I have been fascinated by hacker conferences. As soon as I learned of their existence, I made a point of keeping tabs on...

Previous 1 2 3 4 5 6 7 8 9 Next

Search for: In:

Facebook Twitter LinkedIn Google+ RSS
Which capabilities in a home robot might induce you to consider buying one?
Help with daily housecleaning chores
Companionship for elderly or disabled family member
Entertaining and educating children
Monitoring security all through the house
Keeping inventory and restocking items when needed
Nothing would persuade me to consider getting a home robot.