Showcase Your Business as a Thought Leader - Publish Your Blog, Videos and Events on ALL EC - Save 25% Now
Welcome Guest | Sign In

Results 81-100 of 1327 for hacker (0.002 secs).

Searching: Articles | Discussions

Sort by Date | Sort by Relevance

Richard Adhikari
LulzSec Rears Its Smirking Head in Military Dating Site Attack
03/27/12 11:58 AM PT | TechNewsWorld | 640 Words

... months after shutting down operations -- and just weeks after several suspected members were arrested -- the LulzSec hacker community has apparently sprung back to life, hacking the website of military dating site MilitarySingles . However, there's some controversy over whether that...

Katherine Noyes
Should Hacking Be Encouraged?
04/29/10 5:00 AM PT | LinuxInsider | 805 Words

It's never explicitly said that qchapter, the author, is a hacker himself, but he has plenty of reasons to encourage the pursuit in the next generation.

"Hackers are not consumer lemmings" is one, for instance; "hackers favor open systems" is another.

Erika Morphy
Disappearance of Books and Movies Shoves Amazon Into Tight Corner
04/14/09 11:24 AM PT | E-Commerce Times | 665 Words

Fumbled or Hacked?
That might have been the end of it, until a hacker claimed he was behind the change in rankings. "There's some quick code to grab all the Gay and Lesbian metadata-tagged books on amazon," he explained in...

Jeremiah T. Gray
It's Time to Hack the Economy
10/15/08 4:00 AM PT | LinuxInsider | 949 Words

... Hacker Underground is dead. Long live the Hacker Underground! In the most recent issue of Phrack Magazine , I read an article titled "The Underground Myth," that makes a number of astute points about the demise of the hacking scene of the...

Stephanie Losi
Daily CyberCrime and Security Report for April 1, 2003
04/01/03 11:44 AM PT | E-Commerce Times | 260 Words

"Chinese hacker groups are planning attacks on U.S.- and U.K.-based Web sites to protest the war in Iraq, the Department of Homeland Security warned in an alert that it unintentionally posted on a government Web site..."

* * *

"The hackers are planning 'distributed denial-of-service...

David Jones
Russian 'Collector' Sells Stolen Email Credentials for a Song
05/05/16 1:47 PM PT | E-Commerce Times | 714 Words

... hacker dubbed "The Collector" turned over 272 million stolen email credentials in his possession, Hold Security announced Wednesday. The hacker bragged online about the stash, which included usernames and passwords, the firm said. It got a copy of the data -- which...

Chris Maxcer
We Can Fly to the Moon, but We Can't Secure the Cloud?
09/04/14 7:21 AM PT | TechNewsWorld | 2114 Words

Apple's Blinders
Let's get this straight: A hacker could gain access to an Apple customer's iCloud account by brute-force guessing a password? How is that possible in 2014? How did Apple not think of this? How could a massive blast...

John P. Mello Jr.
ID Theft Gives Apple Another Security Black Eye
09/10/12 5:00 AM PT | TechNewsWorld | 1209 Words

Breach Diary
Sept. 3: Three UK police websites breached and email addresses, account passwords of staff working on Safer Neighborhoods program posted on Web by hacker who claims to support WikiLeaks founder Julian Assange.

Sept. 3: Reports identify the...

Richard Adhikari
Anonymous Launches Cyberattack Salvo on China
04/05/12 11:54 AM PT | TechNewsWorld | 647 Words

... purporting to be members of the nebulous online hacker community Anonymous have reportedly hit almost 400 websites in China. The attacks have apparently been going on since March 30. They are listed on the Anonymous China Twitter page .

Targets included...

Ed Sutherland
Protecting NASA From Hackers Is Not Rocket Science, Say Analysts
03/05/12 12:23 PM PT | TechNewsWorld | 695 Words

UK-Based NASA Hacker
Gary McKinnon, a 45-year-old hacker based in the UK, is accused of breaking into NASA computers, among other U.S. government networks during 2001 and 2002. In February, a 20-year-old hacker that went by the handle "TinKode" was...

Richard Adhikari
'Nightmare' Hackers Take Swipe at Israeli Stock Exchange, Airline
01/16/12 3:11 PM PT | TechNewsWorld | 683 Words

Swapping Cyberslaps
Shortly after the attacks on Monday, a Saudi hacker calling himself "0xOmar" said he'd teamed up with the "Nightmare" group and warned of more attacks, Ynetnews reported . He also demanded Israel's Deputy Foreign Minister Danny Ayalon retract...

Katherine Noyes
FTC Puts Social Nets on Notice With Twitter Smackdown
06/25/10 8:50 AM PT | E-Commerce Times | 1091 Words

In January, a hacker used an automated password-guessing tool to find an administrative password on the site . The password was a weak, lowercase, common dictionary word; using it, the hacker reset several passwords and posted some of them elsewhere for access...

Erika Morphy
Twitter Hack Opens Pandora's Box of Security Issues
07/16/09 1:10 PM PT | E-Commerce Times | 788 Words

About a month ago, a hacker was able to access a Twitter employee's personal email account, according to a blog post by Twitter cofounder Biz Stone. Once there, the hacker struck the mother lode: access to the employee's Google Apps account, which contained...

Jack M. Germain
VoIP: When Cheaper Could Mean Costlier
04/24/08 4:00 AM PT | TechNewsWorld | 1046 Words

A hacker could, for example, tap into a corporate VoIP system and listen to confidential calls. Another typical security risk involves hackers slipping into a call center using VoIP and listening as customers give sensitive information like Social Security numbers and financial account...

Chris Maxcer
Sun's Solaris 10 Highly Vulnerable to Unlikely Telnet Exploit
02/14/07 4:00 AM PT | LinuxInsider | 507 Words

The vulnerability is oxymoronic because, while it's possible for a hacker to gain potentially devastating access to a system , the administrators in charge of the system would also have to set up telnet usage against Sun's recommendations in a way that would...

Anthony Mitchell
A Leet Primer
12/06/05 7:00 AM PT | E-Commerce Times | 2360 Words

Leet's offline expansion is accompanied by a spreading of leet attitudes and computer hacker concepts. We are being spammed in leet, marketed to in leet, and spoken to in leet. We are increasingly using leet in our own communication, often without realizing...

Tanya Candia
The IT Security Paradox
02/16/05 5:00 AM PT | TechNewsWorld | 1109 Words

Dangerous Trend
This trend originally surfaced in 2000, when a hacker infiltrated networks at the Bloomberg financial news service. The hacker attempted to extort $200,000 from Michael Bloomberg, now mayor of New York. In return, the hacker promised to remain...

Lori Enos
One Year Ago: Egghead Hacked and Cracked
12/26/01 6:07 PM PT | E-Commerce Times | 422 Words

Computer products e-tailer said Friday that a hacker has breached its computer systems and may have gained access to its customer database .

The company added that it has retained the "world's leading computer security experts" to investigate the breach and...

Elizabeth Blakey
Daily Cybercrime and Security Report for September 17, 2001
09/17/01 11:32 AM PT | E-Commerce Times | 321 Words

Total Telecom: Hacker Community Responds to Terrorist Attacks
17-Sep-01 05:12:29 ET

Story Highlights:
"This week's terrorist attacks on New York and Washington have prompted the world's hacker community into action..."

* * *

"A group of hackers going under the name of...

Elizabeth Blakey
Daily Cybercrime and Security Report for July 23, 2001
07/23/01 11:32 AM PT | E-Commerce Times | 333 Words

CNN: Rallies Planned for Arrested Hacker
23-Jul-01 03:07:50 ET

Story Highlights:
"The arrest this week of a 26-year-old Russian software programmer accused of violating U.S. copyright law has sparked protests and pledges of support from a wide range of free speech...

Previous 1 2 3 4 5 6 7 8 9 10 Next

Search for: In:

Facebook Twitter LinkedIn Google+ RSS
What best describes your attitude toward social networks and politics?
The value of engaging in serious political discourse outweighs the negatives.
Most of the political conversations seem overheated and ignorant.
Social networks provide a lot of very good political information from reliable sources.
Almost every political post I see is skewed or totally fake.
Political interactions on social networks simply mirror those in the real world.
Social networks remove inhibitions, bringing out the worst in people and politics.