Search Results for "" hacker ""
Not finding what you’re looking for?
10 of 154 Results
Back Doors Beckon Openly
While information technology experts have been hard at work securing the national infostructure, other key sectors in the United States' vital infrastructure may be vulnerable to attack through their own information systems. Critical elements such as ports, railroads, the electrical grid, fuel pipelines and hazardous materials facilities may be equipped with information systems that are virtual open doors to malicious marauders ranging from rookie hackers to al-Qaida terrorists.
Virtual Hackers Help Take a Byte Out of Cybercrime
Solutions to today's information security challenges may reside in the virtual world. Modeling, simulation and evolutionary computational techniques offer organizations a way to observe how real hackers operate and attack systems. Because tireless computers are doing all the work, data can be gathered around the clock ready for analysts to examine and evaluate.
Mom Inspires NSA Hacker
Sometimes tinkering with technology runs in the family.
Image

Electronic Commerce Commands Canny Insight Into Hacker Moves
Profound Internet growth and the changes it generates in the economy and society is a double-edged sword. Electronic commerce benefits are fundamentally altering the way people produce, consume and communicate. Yet, risks and vulnerabilities are inherent network byproducts. Growing electronic threats mandate risk management, customer confidence and at least some level of information protection.
Social [Media] Security
Dr. Scott Wells, co-founder and chief architect of the Social Media Security Professional (SMSP) certification, Ultimate Knowledge Institute, shares some little-known facts about the threats social media pose to organizations and individuals.
Defense Digital Service and HackerOne Initiate Third ‘Hack the Army’ Bug Bounty Challenge
The Defense Digital Service (DDS) and HackerOne announced the launch of DDS’s eleventh bug bounty program with HackerOne.
Image

To Win the Cyber War, Think Like a Hacker
Adopting an attacker’s mindset helps shore up defenses from the inside out.
Image

Mission First: The Story of an NSA Hacker
A front-line network warrior describes the heat of battle.
Image

Hacking the Human Is the Next Cyber Threat
Security flaws in medical nanotechnologies could be deadly.
Image

Adaptive Response Tool Foils Hacker Intrusion
Software designers are applying artificial intelligence principles to new computer security systems. These tools and protocols create the potential for agile software capable of quickly identifying and responding to new threats.