Attention B2B Marketers: Access 30 Million IT Decision Makers with a Custom Lead Generation Program Click to Learn More!
Welcome Guest | Sign In

Results 81-100 of 1319 for hacker (0.002 secs).

Searching: Articles | Discussions

Sort by Date | Sort by Relevance

Erika Morphy
Disappearance of Books and Movies Shoves Amazon Into Tight Corner
04/14/09 11:24 AM PT | E-Commerce Times | 665 Words

Fumbled or Hacked?
That might have been the end of it, until a hacker claimed he was behind the change in rankings. "There's some quick code to grab all the Gay and Lesbian metadata-tagged books on amazon," he explained in...

Jeremiah T. Gray
It's Time to Hack the Economy
10/15/08 4:00 AM PT | LinuxInsider | 949 Words

... Hacker Underground is dead. Long live the Hacker Underground! In the most recent issue of Phrack Magazine , I read an article titled "The Underground Myth," that makes a number of astute points about the demise of the hacking scene of the...

Stephanie Losi
Daily CyberCrime and Security Report for April 1, 2003
04/01/03 11:44 AM PT | E-Commerce Times | 260 Words

"Chinese hacker groups are planning attacks on U.S.- and U.K.-based Web sites to protest the war in Iraq, the Department of Homeland Security warned in an alert that it unintentionally posted on a government Web site..."

* * *

"The hackers are planning 'distributed denial-of-service...

David Jones
Russian 'Collector' Sells Stolen Email Credentials for a Song
05/05/16 1:47 PM PT | E-Commerce Times | 714 Words

... hacker dubbed "The Collector" turned over 272 million stolen email credentials in his possession, Hold Security announced Wednesday. The hacker bragged online about the stash, which included usernames and passwords, the firm said. It got a copy of the data -- which...

Chris Maxcer
We Can Fly to the Moon, but We Can't Secure the Cloud?
09/04/14 7:21 AM PT | TechNewsWorld | 2114 Words

Apple's Blinders
Let's get this straight: A hacker could gain access to an Apple customer's iCloud account by brute-force guessing a password? How is that possible in 2014? How did Apple not think of this? How could a massive blast...

John P. Mello Jr.
ID Theft Gives Apple Another Security Black Eye
09/10/12 5:00 AM PT | TechNewsWorld | 1209 Words

Breach Diary
Sept. 3: Three UK police websites breached and email addresses, account passwords of staff working on Safer Neighborhoods program posted on Web by hacker who claims to support WikiLeaks founder Julian Assange.

Sept. 3: Reports identify the...

Richard Adhikari
Anonymous Launches Cyberattack Salvo on China
04/05/12 11:54 AM PT | TechNewsWorld | 647 Words

... purporting to be members of the nebulous online hacker community Anonymous have reportedly hit almost 400 websites in China. The attacks have apparently been going on since March 30. They are listed on the Anonymous China Twitter page .

Targets included...

Ed Sutherland
Protecting NASA From Hackers Is Not Rocket Science, Say Analysts
03/05/12 12:23 PM PT | TechNewsWorld | 695 Words

UK-Based NASA Hacker
Gary McKinnon, a 45-year-old hacker based in the UK, is accused of breaking into NASA computers, among other U.S. government networks during 2001 and 2002. In February, a 20-year-old hacker that went by the handle "TinKode" was...

Richard Adhikari
'Nightmare' Hackers Take Swipe at Israeli Stock Exchange, Airline
01/16/12 3:11 PM PT | TechNewsWorld | 683 Words

Swapping Cyberslaps
Shortly after the attacks on Monday, a Saudi hacker calling himself "0xOmar" said he'd teamed up with the "Nightmare" group and warned of more attacks, Ynetnews reported . He also demanded Israel's Deputy Foreign Minister Danny Ayalon retract...

Katherine Noyes
FTC Puts Social Nets on Notice With Twitter Smackdown
06/25/10 8:50 AM PT | E-Commerce Times | 1091 Words

In January, a hacker used an automated password-guessing tool to find an administrative password on the site . The password was a weak, lowercase, common dictionary word; using it, the hacker reset several passwords and posted some of them elsewhere for access...

Erika Morphy
Twitter Hack Opens Pandora's Box of Security Issues
07/16/09 1:10 PM PT | E-Commerce Times | 788 Words

About a month ago, a hacker was able to access a Twitter employee's personal email account, according to a blog post by Twitter cofounder Biz Stone. Once there, the hacker struck the mother lode: access to the employee's Google Apps account, which contained...

Jack M. Germain
VoIP: When Cheaper Could Mean Costlier
04/24/08 4:00 AM PT | TechNewsWorld | 1046 Words

A hacker could, for example, tap into a corporate VoIP system and listen to confidential calls. Another typical security risk involves hackers slipping into a call center using VoIP and listening as customers give sensitive information like Social Security numbers and financial account...

Chris Maxcer
Sun's Solaris 10 Highly Vulnerable to Unlikely Telnet Exploit
02/14/07 4:00 AM PT | LinuxInsider | 507 Words

The vulnerability is oxymoronic because, while it's possible for a hacker to gain potentially devastating access to a system , the administrators in charge of the system would also have to set up telnet usage against Sun's recommendations in a way that would...

Anthony Mitchell
A Leet Primer
12/06/05 7:00 AM PT | E-Commerce Times | 2360 Words

Leet's offline expansion is accompanied by a spreading of leet attitudes and computer hacker concepts. We are being spammed in leet, marketed to in leet, and spoken to in leet. We are increasingly using leet in our own communication, often without realizing...

Tanya Candia
The IT Security Paradox
02/16/05 5:00 AM PT | TechNewsWorld | 1109 Words

Dangerous Trend
This trend originally surfaced in 2000, when a hacker infiltrated networks at the Bloomberg financial news service. The hacker attempted to extort $200,000 from Michael Bloomberg, now mayor of New York. In return, the hacker promised to remain...

Lori Enos
One Year Ago: Egghead Hacked and Cracked
12/26/01 6:07 PM PT | E-Commerce Times | 422 Words

Computer products e-tailer said Friday that a hacker has breached its computer systems and may have gained access to its customer database .

The company added that it has retained the "world's leading computer security experts" to investigate the breach and...

Elizabeth Blakey
Daily Cybercrime and Security Report for September 17, 2001
09/17/01 11:32 AM PT | E-Commerce Times | 321 Words

Total Telecom: Hacker Community Responds to Terrorist Attacks
17-Sep-01 05:12:29 ET

Story Highlights:
"This week's terrorist attacks on New York and Washington have prompted the world's hacker community into action..."

* * *

"A group of hackers going under the name of...

Elizabeth Blakey
Daily Cybercrime and Security Report for July 23, 2001
07/23/01 11:32 AM PT | E-Commerce Times | 333 Words

CNN: Rallies Planned for Arrested Hacker
23-Jul-01 03:07:50 ET

Story Highlights:
"The arrest this week of a 26-year-old Russian software programmer accused of violating U.S. copyright law has sparked protests and pledges of support from a wide range of free speech...

Elizabeth Blakey
Daily Cybercrime and Security Report for June 18, 2001
06/18/01 11:40 AM PT | E-Commerce Times | 389 Words

ComputerUser: Hacker Turns RTF Exploit Theory into Reality
16-Jun-01 04:55:44 ET

Story Highlights:
"An anti-virus company say that at least one hacker has released rogue code that takes advantage of a recently uncovered security hole in Microsoft Word's handling of...

Elizabeth Blakey
Daily Cybercrime and Security Report for May 30, 2001
05/30/01 11:18 AM PT | E-Commerce Times | 382 Words

The Register: @Home's Mis-Configured Proxy Excites Hacker
29-May-01 14:33:33 ET

Story Highlights:
"A single misconfigured server exposed broadband provider Excite@Home's internal corporate network to hackers for at least three months..."

* * *

"An Excite@Home spokesperson confirmed that the company recently shut down...

Previous 1 2 3 4 5 6 7 8 9 10 Next

Search for: In:

Facebook Twitter LinkedIn Google+ RSS
Of the following CES 2018 crowd pleasers, which do you consider the most important or desirable new tech?
Google Assistant -- voice-activated AI on displays everywhere
Helite's Hip'Air - a hip-protecting airbag belt for seniors
HTC Vive Pro - a VR headset with way better resolution and sound
Samsung's 'The Wall' - a modular TV with MicroLED for consumers
Sony's Aibo -- a lovable AI-powered robotic pet dog
Toyota's e-Palette -- a self-driving van for deliveries and more