hackers - News, Features, and Slideshows
hackers in pictures
Hackers based in Iran have been using malware to spy on individuals, including potentially dissidents and activists in the country, according to new research from Symantec.
By Jeremy Kirk | 08 December, 2015 04:21
For nearly a year, Chinese hackers have used a novel one-two punch to compromise iOS devices.
By Gregg Keizer | 06 October, 2015 00:28
Thousands of medical devices, including MRI scanners, x-ray machines and drug infusion pumps, are vulnerable to hacking, creating significant health risks for patients, security researchers said this week.
By James Niccolai | 30 September, 2015 03:50
Russian-speaking hackers have breached 97 websites, mostly dating-related, and stolen login credentials, putting hundreds of thousands of users at risk.
By Jeremy Kirk | 31 August, 2015 04:30
AshleyMadison.com's owner said it is examining a large batch of data posted online by hackers who breached the website last month.
By Jeremy Kirk | 19 August, 2015 03:32
Well, that was fast. Do-it-yourself electronics kit maker and hobby retailer Adafruit recently announced that a hacker had won the company's Open Kinect Bounty. Spain-based hacker Hector Martin Cantero, who is known online as "marcan," released a proof-of-concept video Wednesday night showing the Kinect interfacing with his Linux-based laptop.
By Ian Paul | 13 November, 2010 02:06
Technology drives just about everything we do, and not just at our jobs. From banks to hospitals to the systems that keep the juice flowing to our homes, we are almost entirely dependent on tech. More and more of these systems are interconnected, and many of them are vulnerable. We see it almost every day.
By Dan Tynan | 16 March, 2010 04:01
Whitepapers about hackers
Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- FTIT Technical LeadVIC
- CCSenior Systems Analyst (Biomedical)SA
- CCWindows System Admin, Administrator, Technical SupportNSW
- CCContract Analyst Programmer (Crystal Reports) 160129/AP/vhs-aAsia
- CCSenior Test AnalystSA
- FTAxway API DeveloperNSW
- CCJava Developer - IOSNSW
- CCService ModellerNSW
- CCIT Performance Test AnalystACT
- FT.NET Tech LeadVIC
- CCIBM ESB Developer (Junior to mid level role)NSW
- CCService Desk ManagerVIC
- CCiOS DeveloperNSW
- FTSecurity ArchitectWA
- CCObjective ECMS Technical ConsultantSA
- CCSolutions ArchitectNSW
- CCLync/Skype EngineerNSW
- CCFront End Developer - MelbourneVIC
- CCInformation Security ManagerNSW
- FTSenior .NET DeveloperVIC
- CCImmediate iOS Developer RequiredNSW
- CCEnterprise Architect - Network & InfrastructureNSW
- CCiOS Developer - New AppNSW
- CCEXCEL Guru / Data AdministratorNSW
- FTNetwork EngineerSA
Internal and external disruptions can impede business continuity and result in negative repercussions for enterprise productivity and data resources. This whitepaper looks at how improved mobility access can shield companies from unprecedented risks, resulting in greater cost savings and enhanced workforce continuity. It also highlights the benefits of having a mobile workspace technology which enables the workforce to have access to apps, desktops and files in difficult situations. Included are four case studies where organisations are able to demonstrate a high level of business continuity with sound disaster recovery strategies in place.
- Microsoft fixes 36 flaws in IE, Edge, Office, Windows, .NET Framework
- Facebook has just 60 days to change its terms and conditions for French users
- Coming to HP's consumer laptops: Smoother video with AMD's FreeSync
- Microsoft delivers Office 2016 to subscribers on the slow train
- Identity thieves obtain 100,000 electronic filing PINs from IRS system
- Retired IT specialist shares inside story of botched National Parks Moose project
- Opera gets acquisition offer from Chinese consortium that includes Qihoo
- US regulator coming around to view that a Google computer could qualify as car driver
- Poseidon hacker group behind long-running extortion scheme
- Is Docker ditching Ubuntu Linux? Confusion reigns
- Google will stop accepting new Flash ads on June 30
- FBI Director entreats tech firms to release encrypted data used in crimes and terror
- World's largest solar plant goes live; will provide power for 1.1M people
- Carriers celebrate as Telecommunications Act of 1996 turns 20
- Obama’s new cybersecurity agenda: What you need to know