Hackers

Displaying 1 - 20 of 21 articles

Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it. Midnight via www.shutterstock.com

Zero-day’ stockpiling puts us all at risk

“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
No one is immune from cyber crime… no matter how protected you think you are. Flickr/Louish Pixel

Why we should all care about cyber crime: the risk to you and me

If you think you're not at risk from cyber crime then think again. Everyone connected to the internet is a potential target and hackers are gathering what they can to try to gain your trust.
Why did Penn State take so long to disclose the breach? Laptop image via www.shutterstock.com

Penn State hack exposes theft risk of student personal data

The recent cyber attacks at Penn State have put personal information of 18,000 students in the hands of hackers. What should universities do to protect students' privacy?
Harnessing the quantum property of light takes security to the next level. Boris Skoric

Quantum physics can fight fraud by making card verification unspoofable

Decades of data security research have brought us highly reliable, standardized tools for common tasks such as digital signatures and encryption. But hackers are constantly working to crack data security…
Is it a crime scene or just a store checkout? Could be both. Marlith

After a data breach, it’s consumers left holding the bag

Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
The changing face of security threats. Vincent Diamante

NATO to unveil cyber-defence strategy fit for changing times

Late one Saturday evening in March, NATO’s Headquarters experienced a large-scale cyber-attack at the hands of a group calling itself Anonymous Bierkut from Ukraine. Non-classified networks were targeted…
What do you mean ‘IHATECAT’ is not a strong password? konsvi

Four steps to a simpler, safer password system

Several high-profile security breaches have, of late, got many people wondering about their passwords. It would be great news if I could tell you a perfect sure-fire system to manage your passwords; the…
Popular online games such as League of Legends were brought down, one by one, as a hacker group trolled a single gamer in December. rafaelgames

How hackers turned online gaming into a real-life fiasco

A spate of internet hacking during the New Year period – including an attack on Skype by hacker group the Syrian Electronic Army, and another on social media photo sharing app Snapchat by website SnapchatDB…
Burning a hole in your virtual pocket. zcopley

Bitcoin’s dilemma: go mainstream, or stay radical?

Bitcoin enthusiasts and libertarians the world over are in a state of confusion about the slowness with which the outside world is catching on to their new way of exchanging money. But regulators and lawmakers…
Wanna take down a casino? DEF CON minglers swap tips. vissago

Hack the mini bar, spot the feds, DEF CON is back

Why would thousands of people flock to Las Vegas, right in the middle of summer, when temperatures easily reach the high thirties, to shut themselves up in one of Sin City’s largest hotels without spending…
You’ve got a message. Hackers knew that before you. Akshat Rathi

The real phone hacking scandal is in your pocket

There are now more mobile devices than people on our planet. The amount of personal data we share through mobile devices is also increasing. So it is not surprising that cyber-criminals want a piece of…

Top contributors

More