Articles sur Computer hacking

Affichage de 1 à 20 de 23 articles

A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing. REUTERS/Lucy Nicholson

Hacking the terror suspect’s iPhone: what the FBI can do now Apple says ‘no’

Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?
Anti-virus software can keep cyber-criminals at bay. shutterstock

Seven easy steps to keep viruses from your devices

Throwing a safety net over one's computer, mobile handset or tablet is a necessity because of the threat of viruses and infections through removable devices.
These days anyone can download the tools used for cyber crime. Ivan David Gomez Arce/Flickr

Hackers’ kit bag: the tools that terrorise the internet

Hacking is a state of mind. Traditionally, hackers like to discover, understand and share the secrets they expose. They like to laugh at the dumb things they find. They’re not necessarily in it for the…
Oops, did I click something dangerous? Matt Law

How we can each fight cybercrime with smarter habits

Hackers gain access to computers and networks by exploiting the weaknesses in our cyber behaviors. Many attacks use simple phishing schemes – the hacker sends an email that appears to come from a trusted…
Hacking can, and should, keep us on our toes. Alexandre Dulaunoy

Wanted: trainee cyber-criminals to help solve skills shortage

The world is already short of computer security experts, but by 2017 that shortfall is going to have reached about two million. Criminal hackers cause damage running to billions of pounds every year…
Is it a crime scene or just a store checkout? Could be both. Marlith

After a data breach, it’s consumers left holding the bag

Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
We should know by now - don’t click that link. Bill Buchanan

In cybersecurity, the weakest link is … you

A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is…
If they go after your computers, it could get worse than that. Alexandrre Claude

Preventing piracy at the cost of your privacy

The theft of intellectual property (IP) online is a serious matter. A 2011 report by the UK Cabinet Office estimates the value of lost IP to the UK economy at about £21 billion. Until recently the debate…

Les contributeurs les plus fréquents

Plus