Menu Close

Articles on Hackers

Displaying 101 - 120 of 126 articles

Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it. Midnight via www.shutterstock.com

Zero-day’ stockpiling puts us all at risk

“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
No one is immune from cyber crime… no matter how protected you think you are. Flickr/Louish Pixel

Why we should all care about cyber crime: the risk to you and me

If you think you’re not at risk from cyber crime then think again. Everyone connected to the internet is a potential target and hackers are gathering what they can to try to gain your trust.
Why did Penn State take so long to disclose the breach? Laptop image via www.shutterstock.com

Penn State hack exposes theft risk of student personal data

The recent cyber attacks at Penn State have put personal information of 18,000 students in the hands of hackers. What should universities do to protect students’ privacy?
Harnessing the quantum property of light takes security to the next level. Boris Skoric

Quantum physics can fight fraud by making card verification unspoofable

Decades of data security research have brought us highly reliable, standardized tools for common tasks such as digital signatures and encryption. But hackers are constantly working to crack data security…
Is it a crime scene or just a store checkout? Could be both. Marlith

After a data breach, it’s consumers left holding the bag

Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
The changing face of security threats. Vincent Diamante

NATO to unveil cyber-defence strategy fit for changing times

Late one Saturday evening in March, NATO’s Headquarters experienced a large-scale cyber-attack at the hands of a group calling itself Anonymous Bierkut from Ukraine. Non-classified networks were targeted…
Making hackers happy. erautio

Google must make Android safer – our data is at risk

Over the past few months, the Android platform developed by Google and based on the Linux operating system has been having a difficult time. Hackers, with malicious intent and those without, have been…
What do you mean ‘IHATECAT’ is not a strong password? konsvi

Four steps to a simpler, safer password system

Several high-profile security breaches have, of late, got many people wondering about their passwords. It would be great news if I could tell you a perfect sure-fire system to manage your passwords; the…
Steve Jobs and Steve Wozniak both dabbled in hacking. thetaxhaven

Berkeley Blue and Oaf Tobar: the hackers inside your iPhone

There is some controversy about what we mean by the word “hacker”. Historically, and as far back as the 1960s, a hacker was someone who was an expert programmer. But today, it is a word generally used…
Popular online games such as League of Legends were brought down, one by one, as a hacker group trolled a single gamer in December. rafaelgames

How hackers turned online gaming into a real-life fiasco

A spate of internet hacking during the New Year period – including an attack on Skype by hacker group the Syrian Electronic Army, and another on social media photo sharing app Snapchat by website SnapchatDB…
Burning a hole in your virtual pocket. zcopley

Bitcoin’s dilemma: go mainstream, or stay radical?

Bitcoin enthusiasts and libertarians the world over are in a state of confusion about the slowness with which the outside world is catching on to their new way of exchanging money. But regulators and lawmakers…

Top contributors

More