hackers - News, Features, and Slideshows
hackers in pictures
The implications of a 1.2 billion username and password hack performed by a Russian group could spell the end of the standard username and password combination, say information security experts.
By Hamish Barwick | 07 August, 2014 16:09
The year's only halfway done, but hackers have already filled enough headlines to last a decade.
By Ian Paul | 24 June, 2014 08:14
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess
By Michael Cooney | 02 July, 2013 11:12
Miss Despoinas – Hobart's critical-engineering-space-cum-virtual-hack-space – is preparing to host a satellite event as part of the 19th International Symposium on Electronic Art.
By Rohan Pearce | 02 May, 2013 13:22
Well, that was fast. Do-it-yourself electronics kit maker and hobby retailer Adafruit recently announced that a hacker had won the company's Open Kinect Bounty. Spain-based hacker Hector Martin Cantero, who is known online as "marcan," released a proof-of-concept video Wednesday night showing the Kinect interfacing with his Linux-based laptop.
By Ian Paul | 13 November, 2010 02:06
Technology drives just about everything we do, and not just at our jobs. From banks to hospitals to the systems that keep the juice flowing to our homes, we are almost entirely dependent on tech. More and more of these systems are interconnected, and many of them are vulnerable. We see it almost every day.
By Dan Tynan | 16 March, 2010 04:01
Whitepapers about hackers
Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.
UXC Connect’s Jesmond Psaila says that DevOps can do for IT operations what Agile did for software development. This paper demonstrates how, by combining both approaches, you can significantly improve operational efficiency and time-to-market. • Marketing and development teams want to constantly change or increase functionality, while IT operations teams want to keep the environment as stable as possible • Agile software development and virtualisation have not solved the time-to-value problem faced by marketing and IT operations teams • Recent movements in DevOps aim to address and redefine a more agile service management platform, while new tools have vastly improved functionality to configure and automate common processes
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTSenior Media TraderNSW
- FTCampaign Managers| RTB / Programmatic | Expression of InterestNSW
- FTChief Information OfficerNSW
This helpful infographic details how Flash is transforming the way we think about storage and enabling innovation across IT, plus helps readers choose the best solutions for their business. Flash allows a new breed of applications, speed, leaner costs, and model efficiency Flexible options allow organizations to bring enterprise-level availability to mission critical, performance-intensive applications Experiencing the full effect of Flash depends on having the right architecture
- Uber vows to defy German ban on its UberPop ride-sharing service
- In earthquakes, alerts may turn machines into action heroes
- Should you buy enterprise applications from a startup?
- Microsoft's Australian Azure region 'just around the corner'
- Healthdirect Australia sees value in open source for security solution
- Namecheap says accounts compromised in hacking incident
- Why hackers may be stealing your credit card numbers for years
- Quickflix suffers $10m loss
- Web Marketing Experts to create 115 new jobs in Melbourne
- Comms Alliance backs website blocking in piracy fight
- Reconnaissance code on industrial software site points to watering hole attack
- China orders Microsoft to explain Windows, Office practices within 20 days
- Europol launches international cybercrime task force
- Show spotlight will be on smartwatches with better looks and connectivity
- China gives Microsoft 20 days to answer questions in anti-monopoly probe