hackers - News, Features, and Slideshows
hackers in pictures
The implications of a 1.2 billion username and password hack performed by a Russian group could spell the end of the standard username and password combination, say information security experts.
By Hamish Barwick | 07 August, 2014 16:09
The year's only halfway done, but hackers have already filled enough headlines to last a decade.
By Ian Paul | 24 June, 2014 08:14
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess
By Michael Cooney | 02 July, 2013 11:12
Miss Despoinas – Hobart's critical-engineering-space-cum-virtual-hack-space – is preparing to host a satellite event as part of the 19th International Symposium on Electronic Art.
By Rohan Pearce | 02 May, 2013 13:22
Well, that was fast. Do-it-yourself electronics kit maker and hobby retailer Adafruit recently announced that a hacker had won the company's Open Kinect Bounty. Spain-based hacker Hector Martin Cantero, who is known online as "marcan," released a proof-of-concept video Wednesday night showing the Kinect interfacing with his Linux-based laptop.
By Ian Paul | 13 November, 2010 02:06
Technology drives just about everything we do, and not just at our jobs. From banks to hospitals to the systems that keep the juice flowing to our homes, we are almost entirely dependent on tech. More and more of these systems are interconnected, and many of them are vulnerable. We see it almost every day.
By Dan Tynan | 16 March, 2010 04:01
Whitepapers about hackers
Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesVIC
- FTStudio Design ManagerVIC
- FTProgram Manager - Integration & SolutionsNSW
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTAcquisition Marketing ExceutiveNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
This paper details results from backup and recovery tests to gain insight into how to build high performance into a unified data protection solution for physical and virtual systems. · Data centres are becoming more difficult to manage and protect as more data and applications are moved into virtual software-defined environments · There is a growing trend within Line of Business (LoB) groups to be over-protective with data by keeping multiple secondary copies · One solution is transitioning to a private cloud paradigm characterized by a software-defined, hypervisor-based, Virtual Infrastructure (VI)
- Weather.com fixes web application vulnerabilities
- Early version of new POS malware family spotted
- Syrian Electronic Army posts hacking message on several news sites
- Fastest LTE speed will be out of reach for most users
- EU net neutrality discussions to continue into the next year
- Over 23,000 Web servers infected with CryptoPHP backdoor
- Panasonic opens smart town targeting zero-emission houses
- Siemens patches critical SCADA flaws likely exploited in recent attacks
- European Parliament calls on Commission to consider breaking up Google
- China to open up Internet broadband market with upcoming trials
- Close shaves between aircraft and drones on the upswing in US
- Obama signs legislation allowing regulatory e-labels for smartphones, wearables
- Data retention inquiry to report in early 2015
- Aus government begins review of cyber security strategy
- Communications coalition urges national focus on broadband adoption