Search Results for "" hacker ""
Not finding what you’re looking for?
10 of 154 Results
While information technology experts have been hard at work securing the national infostructure, other key sectors in the United States' vital infrastructure may be vulnerable to attack through their own information systems. Critical elements such as ports, railroads, the electrical grid, fuel pipelines and hazardous materials facilities may be equipped with information systems that are virtual open doors to malicious marauders ranging from rookie hackers to al-Qaida terrorists.
Solutions to today's information security challenges may reside in the virtual world. Modeling, simulation and evolutionary computational techniques offer organizations a way to observe how real hackers operate and attack systems. Because tireless computers are doing all the work, data can be gathered around the clock ready for analysts to examine and evaluate.
Sometimes tinkering with technology runs in the family.
Profound Internet growth and the changes it generates in the economy and society is a double-edged sword. Electronic commerce benefits are fundamentally altering the way people produce, consume and communicate. Yet, risks and vulnerabilities are inherent network byproducts. Growing electronic threats mandate risk management, customer confidence and at least some level of information protection.
The Defense Digital Service (DDS) and HackerOne announced the launch of DDS’s eleventh bug bounty program with HackerOne.
Adopting an attacker’s mindset helps shore up defenses from the inside out.
A front-line network warrior describes the heat of battle.
Security flaws in medical nanotechnologies could be deadly.
Software designers are applying artificial intelligence principles to new computer security systems. These tools and protocols create the potential for agile software capable of quickly identifying and responding to new threats.