hackers - News, Features, and Slideshows
hackers in pictures
The implications of a 1.2 billion username and password hack performed by a Russian group could spell the end of the standard username and password combination, say information security experts.
By Hamish Barwick | 07 August, 2014 16:09
The year's only halfway done, but hackers have already filled enough headlines to last a decade.
By Ian Paul | 24 June, 2014 08:14
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess
By Michael Cooney | 02 July, 2013 11:12
Miss Despoinas – Hobart's critical-engineering-space-cum-virtual-hack-space – is preparing to host a satellite event as part of the 19th International Symposium on Electronic Art.
By Rohan Pearce | 02 May, 2013 13:22
Well, that was fast. Do-it-yourself electronics kit maker and hobby retailer Adafruit recently announced that a hacker had won the company's Open Kinect Bounty. Spain-based hacker Hector Martin Cantero, who is known online as "marcan," released a proof-of-concept video Wednesday night showing the Kinect interfacing with his Linux-based laptop.
By Ian Paul | 13 November, 2010 02:06
Technology drives just about everything we do, and not just at our jobs. From banks to hospitals to the systems that keep the juice flowing to our homes, we are almost entirely dependent on tech. More and more of these systems are interconnected, and many of them are vulnerable. We see it almost every day.
By Dan Tynan | 16 March, 2010 04:01
Whitepapers about hackers
Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
In July 2013, VCE commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by re-platforming SAP on VCE™ through factory-integrated systems called VblockTM Systems. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact on their organization of implementing a VCE converged infrastructure solution for SAP.
- US rejects North Korea offer to investigate Sony hack, reaches out to China
- North Korea wants joint probe into Sony hack, warns of consequences if not
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright