Attention B2B Marketers: Access 30 Million IT Decision Makers with a Custom Lead Generation Program Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com

Results 1-20 of 1325 for hacker (0.002 secs).

Searching: Articles | Discussions

Sorted by Date | Sort by Relevance

Jonathan Terrasi
Can Hackers Crack the Ivory Towers?
06/19/18 7:00 AM PT | LinuxInsider | 1011 Words

"In the academic community, it's all about getting tenure, and you do that by getting published in a subset of serious journals and speaking at a subset of what they call 'top conferences,'" she explained. "For the hacker world ... it could...

Jonathan Terrasi
DevOps: Plenty of Devs, Not Enough Ops
05/29/18 9:20 AM PT | LinuxInsider | 933 Words

In his presentation at the third iteration of the CypherCon hacker conference held last month in Milwaukee, Bryan described an anonymized engagement in which he probed the network of a development team responsible for 1.2 million user accounts. His purpose was to...

John P. Mello Jr.
FBI Declaws Russian Fancy Bear Botnet
05/25/18 5:00 AM PT | TechNewsWorld | 877 Words

The hacker group, known as "Fancy Bear," has been using a malware program called "VPN Filter" to compromise home and small office routers made by Linksys, MikroTik, Netgear and TP-Link, as well as QNAP network-attached storage devices.

VPN Filter is "particularly concerning"...

David Jones
Amazon's Latest Delivery Scheme Involves Handing Over Your Car Keys
04/25/18 11:26 AM PT | E-Commerce Times | 609 Words

If the Amazon service has the proper encryption, then a hacker cannot just use a "sniff and replay" attack to access the system, noted Brian Martin, vice president of vulnerability intelligence at Risk Based Security .

However, this type of technology...

John P. Mello Jr.
'Holy Grail' Exploit Puts Nintendo Switch Consoles at Risk
04/25/18 10:30 AM PT | TechNewsWorld | 652 Words

"Of course, there is a defense to some degree in unmodifiability, but that always presupposes that no flaws exist," he continued," and as we see in this attack, there are a number of smart hacker types in the community determined to find...

John P. Mello Jr.
Researcher Cracks 'Hacker-Proof' Crypto Wallet
03/22/18 11:11 AM PT | TechNewsWorld | 642 Words

A hardware wallet for virtual currencies with millions of users has been compromised by a 15-year-old security researcher. Saleem Rashid explained...

John P. Mello Jr.
Risky Scripts Pose Threat to Web Surfers, Say Researchers
11/28/17 11:24 AM PT | TechNewsWorld | 1166 Words

That makes the playback page vulnerable to a man-in-middle attack that could suck all the data from the page and into a hacker's hands.

What's more, some services don't use HTTPS to communicate with their clients, which exposes the transmissions to...

Jack M. Germain
RoboCyberWall Aims to Block Linux Server Hacks
10/04/17 4:30 PM PT | LinuxInsider | 825 Words

The product's Modular Security paradigm for Linux server perimeters has been hacker tested for more than a year. It is far more secure than yesterday's all-in-one firewalls, according to the company, which describes them as "Jack of All Trades, Master of None."...

Jonathan Terrasi
Linux: Come for the Kernel, Stay for the Popcorn
09/20/17 3:22 PM PT | LinuxInsider | 921 Words

One example of this is the predominantly Linux-focused podcast Hacker Public Radio . The series has no designated host, instead calling on listeners to submit episodes for the benefit of the rest of the audience.

In this way, community members don't merely...

David Jones
Apache Mounts Strong Defense, Equifax Retreats
09/12/17 11:14 AM PT | LinuxInsider | 772 Words

Actual breaches are not preventable, he noted, as a skilled hacker who wants to access your personal data will do so if they try hard enough -- but that was not the problem in the Equifax case.

Storing consumer financial data...

John P. Mello Jr.
Global Cyberattack on Energy Sector Stokes Deep Fears
09/07/17 11:11 AM PT | TechNewsWorld | 670 Words

... hacker group known as "Dragonfly" is behind sophisticated wave of recent cyberattacks on the energy sectors of Europe and North America, Symantec reported Wednesday. The attacks could provide the group with the means to severely disrupt energy operations on both continents.

...

Peter Suciu
HBO Cyberattack Driven By Mysterious Motives
08/03/17 1:11 PM PT | TechNewsWorld | 828 Words

"Unless HBO's hackers release more damaging or controversial data, or are aided by Wikileaks, this event is likely to be less disruptive than the Sony hack," he observed. "That said, it should still inspire Netflix, Amazon and others in the entertainment and film industries to examine and shore up their network security -- or be the next in line to be hacker targets." ...

Jonathan Terrasi
Hacking and Linux Go Together Like 2 Keys in a Key Pair
05/31/17 3:16 PM PT | LinuxInsider | 1084 Words

... since taking an interest Linux , with the specific aim of better understanding and enhancing my personal digital security, I have been fascinated by hacker conferences. As soon as I learned of their existence, I made a point of keeping tabs on...

David Jones
Microsoft Bashes NSA Following Massive Ransomware Attacks
05/15/17 4:15 PM PT | E-Commerce Times | 903 Words

The German Deutsche Bahn rail system largely has recovered from an attack of the initial strain of Wannacry, which caused electronic departure boards to display the hacker's ransom demands, according to Lutz Miller, spokesperson for the rail service.

Train operations...

Jonathan Terrasi
What Internet-Connected War Might Look Like
05/10/17 5:00 AM PT | LinuxInsider | 1008 Words

This might sound like the action movie of a hacker's dreams, but The Army Cyber Institute at West Point is training its recruits to do just that. At Chicago's Thotcon hacker conference last week, attendees got a glimpse of what its elite...

Peter Suciu
Our Sci-Fi Future: Silly vs. Terrifying
04/25/17 5:00 AM PT | TechNewsWorld | 1467 Words

Case, the main character in Gibson's seminal book Neuromancer , is a "console cowboy" -- basically a hacker by another, more creative name. The character is down on his luck, and by taking on a job no one wants, he is able...

John P. Mello Jr.
Microsoft's Timely Response to Shadow Brokers Threat Raises Questions
04/18/17 9:58 AM PT | TechNewsWorld | 879 Words

... as the Shadow Brokers hacker group started crowing about a dump of never-seen-before flaws in Windows, Microsoft announced it already had fixed most of the exploits. "Today, Microsoft triaged a large release of exploits made publicly available by Shadow Brokers," Microsoft Principal...

John P. Mello Jr.
Hackers Blast Emergency Sirens in Dallas
04/11/17 5:00 AM PT | TechNewsWorld | 830 Words

Screaming sirens serenaded Dallas residents in the early morning hours Saturday after a cyberattack set off the city's emergency warning system....

John P. Mello Jr.
Samsung's Tizen OS Riddled With Security Holes
04/04/17 4:00 PM PT | LinuxInsider | 850 Words

Store App Vulnerable
While all the vulnerabilities in the software allow a hacker to take control of devices running Tizen, a flaw Neiderman found particularly disturbing compromised the software used to install software through the app store for the OS.

David Jones
Group Demands Apple Pay Ransom for iCloud Credentials
03/24/17 3:47 PM PT | TechNewsWorld | 790 Words

It claimed that its iCloud ransom demands were in part to spread awareness of Albayrek, as well as of Karim Baratov, a Canadian resident charged earlier this month , along with a second hacker and two Russian FSB agents, in the 2014 breach...

1 2 3 4 5 6 Next

Search for: In:

Facebook Twitter LinkedIn Google+ RSS
How does the tech industry compare to other industries when it comes to diversity?
Tech firms have been working much harder than others to achieve diversity.
Tech is rife with sexism, racism, homophobia and other forms of discrimination.
The tech industry would be more inclusive if there were more qualified applicants.
Tech firms have made superficial efforts but they're mainly for show.
The push for diversity is a cultural fad, and there is no real problem.