hackers - News, Features, and Slideshows
hackers in pictures
The year's only halfway done, but hackers have already filled enough headlines to last a decade.
By Ian Paul | 24 June, 2014 08:14
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess
By Michael Cooney | 02 July, 2013 11:12
Miss Despoinas – Hobart's critical-engineering-space-cum-virtual-hack-space – is preparing to host a satellite event as part of the 19th International Symposium on Electronic Art.
By Rohan Pearce | 02 May, 2013 13:22
Hackers are brazenly infiltrating corporate networks to steal valuable data for purposes of sharing it with other companies or nation-states -- and they're getting away with it, say security researchers sharing war stories at the Hacker Halted conference in Miami this week.
By Ellen Messmer | 30 October, 2012 18:35
Well, that was fast. Do-it-yourself electronics kit maker and hobby retailer Adafruit recently announced that a hacker had won the company's Open Kinect Bounty. Spain-based hacker Hector Martin Cantero, who is known online as "marcan," released a proof-of-concept video Wednesday night showing the Kinect interfacing with his Linux-based laptop.
By Ian Paul | 13 November, 2010 02:06
Technology drives just about everything we do, and not just at our jobs. From banks to hospitals to the systems that keep the juice flowing to our homes, we are almost entirely dependent on tech. More and more of these systems are interconnected, and many of them are vulnerable. We see it almost every day.
By Dan Tynan | 16 March, 2010 04:01
Whitepapers about hackers
Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
BYOD brings flexibility and improved productivity. But it can also add inconsistent user experiences, data security challenges… even legal liabilities. How can you make sure you get all the benefits—and none of the hassles? Read this tip sheet to learn the top considerations before you BYOD.
- Russian government offers money for identifying Tor users
- EU, Google, Microsoft, Yahoo meet on 'right to be forgotten' but questions remain
- The Pirate Bay makes searching for torrents easier on mobile devices
- Changes afoot as DARPA challenge robots prep for upgrade
- Apple faces privacy suit following Chinese TV report
- Government pushes website blocks to fight piracy
- New guide aims to remove the drama of reporting software flaws
- 'Canvas fingerprinting' tracking is sneaky but easy to halt
- Baidu reports strong mobile ad sales, echoing Facebook
- ASX-listed Bitcoin miner hails results
- UNSW researchers see future for Oculus Rift in engineering
- IoT inspires new components for energy, wireless
- Bitcoin: Addressing concerns over a 51% attack
- In Pictures: 14 must-have iPhone, iPad travel apps
- Newegg takes pre-orders for Samsung's first 3D Pro SSD