Articles on Hackers

Displaying 1 - 20 of 31 articles

Seeking a peaceful handover of power between parties and political opponents. Jim Young/Reuters

Election legitimacy at risk, even without a November cyberattack

It's true that sophisticated hackers may be able to tilt the presidential election. But the more likely threat to democracy comes from sore losers who sow doubt about voting integrity.
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing. REUTERS/Lucy Nicholson

Hacking the terror suspect’s iPhone: what the FBI can do now Apple says ‘no’

Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?
2015 saw us complete our exploration of all nine planets (including dwarf planet Pluto) in our solar system. NASA

2015, the year that was: Science + Technology

2015 was a year where we expanded our view of the universe, embraced new technologies and got a hint of the profound changes to come.
The fingerprints might indicate China, but that’s not so easy to prove. Shutterstock

How we trace the hackers behind a cyber attack

This week's hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it's notoriously difficult to pinpoint the origin of a hack.
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it. Midnight via www.shutterstock.com

Zero-day’ stockpiling puts us all at risk

“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
No one is immune from cyber crime… no matter how protected you think you are. Flickr/Louish Pixel

Why we should all care about cyber crime: the risk to you and me

If you think you're not at risk from cyber crime then think again. Everyone connected to the internet is a potential target and hackers are gathering what they can to try to gain your trust.
Why did Penn State take so long to disclose the breach? Laptop image via www.shutterstock.com

Penn State hack exposes theft risk of student personal data

The recent cyber attacks at Penn State have put personal information of 18,000 students in the hands of hackers. What should universities do to protect students' privacy?
Harnessing the quantum property of light takes security to the next level. Boris Skoric

Quantum physics can fight fraud by making card verification unspoofable

Decades of data security research have brought us highly reliable, standardized tools for common tasks such as digital signatures and encryption. But hackers are constantly working to crack data security…
Is it a crime scene or just a store checkout? Could be both. Marlith

After a data breach, it’s consumers left holding the bag

Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
The changing face of security threats. Vincent Diamante

NATO to unveil cyber-defence strategy fit for changing times

Late one Saturday evening in March, NATO’s Headquarters experienced a large-scale cyber-attack at the hands of a group calling itself Anonymous Bierkut from Ukraine. Non-classified networks were targeted…

Top contributors

More