Articles on Computer hacking

Displaying 1 - 20 of 25 articles

At CIA headquarters on Jan. 17, Trump said the ‘dishonest media’ made it appear he was having a feud with the intel community. Olivier Douliery/AP via CNP

Six myths about national security intelligence

The president, the press and the public have misguided ideas about how intelligence is produced and analyzed. A Georgetown professor sets us straight.
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing. REUTERS/Lucy Nicholson

Hacking the terror suspect’s iPhone: what the FBI can do now Apple says ‘no’

Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?
Anti-virus software can keep cyber-criminals at bay. shutterstock

Seven easy steps to keep viruses from your devices

Throwing a safety net over one's computer, mobile handset or tablet is a necessity because of the threat of viruses and infections through removable devices.
These days anyone can download the tools used for cyber crime. Ivan David Gomez Arce/Flickr

Hackers’ kit bag: the tools that terrorise the internet

Hacking is a state of mind. Traditionally, hackers like to discover, understand and share the secrets they expose. They like to laugh at the dumb things they find. They’re not necessarily in it for the…
Hacking can, and should, keep us on our toes. Alexandre Dulaunoy

Wanted: trainee cyber-criminals to help solve skills shortage

The world is already short of computer security experts, but by 2017 that shortfall is going to have reached about two million. Criminal hackers cause damage running to billions of pounds every year…
Is it a crime scene or just a store checkout? Could be both. Marlith

After a data breach, it’s consumers left holding the bag

Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
We should know by now - don’t click that link. Bill Buchanan

In cybersecurity, the weakest link is … you

A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is…

Top contributors

More