Who can stop cybervandals?

Koerner, Brendan I.; Glasser, Jeff
February 2000
U.S. News & World Report;02/28/2000, Vol. 128 Issue 8, p54
Reports on efforts by the United States government to tighten Internet security to prevent computer hackers from breaking into web sites. Response to early February attacks which temporarily disabled several high-profile electronic commerce sites, such as Yahoo! and eBay; Estimated amount that companies will spend to upgrade their computer security; Types of security software that has been introduced, including Zone Labs' Zone Alarm and Counterpane Internet Security's ZombieScan.


Related Articles

  • A note on the hostage deal.  // Power Line;1/18/2016, p6 

    The article offers some details about the case of convicted Iranian hacker Nima Golestaneh who stole software from Vermont aerospace/defense company Arrow Tech and comments on his inclusion among the Iranians released by the U.S. in exchange for some American hostages freed by Iran.

  • SEC Indicts Hackers, Traders. Investor's Business Daily // Investors Business Daily;8/12/2015, pA01 

    5 The regulator indicted 2 Ukrainian hackers and several U.S. securities traders for allegedly netting $30 mil in illegal profits by hacking press announcements and then trading on the information before it became public. The SEC filed a separate lawsuit alleging that more defendants obtained...

  • Fannie Attack. Wolfe, Daniel // American Banker;2/4/2009, Vol. 174 Issue 23, p5 

    The article reports that Rajendrasinh Makwana, a Unix computer programming engineer formerly employed by Fannie Mae, has been indicted on charges he installed malware designed to cripple the government-sponsored enterprise's computer systems. Makwana is alleged to have written and installed the...

  • Code Is Speech. Coleman, Gabriella // Reason;Apr2013, Vol. 44 Issue 11, p34 

    The article reports issues related to computer source code, free software and hackers in the U.S. It mentions the efforts of technologist Seth Schoen in redefining the definition of liberal freedom, property and software through his assertion of the code as a speech. It notes that its lengthy...

  • IBM juices up cryptolope, net.commerce server. Kerstetter, Jim // PC Week;09/15/97, Vol. 14 Issue 39, p41 

    Presents information on new or upgraded applications for security by IBM unveiled at the Internet Commerce Expo 1997 in Los Angeles, California. Cryptolope Live, intellectual property protection technology; Cryptolope Live Server to follow; Electronic data interchange (EDI) interface to be...

  • SetUp.  // eWeek;12/11/2000, Vol. 17 Issue 50, p89 

    Describes the security features for electronic commerce transactions in the Interchange 4.6 software.

  • LEGAL, CORPORATE WOES HAMPER PROSECUTIONS.  // InfoWorld;01/29/2001, Vol. 23 Issue 5, p10 

    Focuses on the problems faced by the court system of the United States in prosecuting hackers which was made complicated by problems the legal system has in applying law to cyberspace and corporate victims. Details on a sentence given by a judge on a teenager who made denial of service attacks...

  • IT gets tools to thwart Webjackers. Scannell, Ed // InfoWorld;11/01/99, Vol. 21 Issue 44, p1 

    Highlights corrupt practices on Internet Web sites. Implications of hackers corrupt practices on electronic commerce revenues; Solution against corrupt practices on the Internet; Government policy on hackers in the United States.

  • Hackers Cop Anti-terrorist Flak. Maher, William // Australian Personal Computer;Nov2001, Issue 275, p16 

    Reports on the laws proposed for Internet hackers in Australia and United States. Classification of computer crimes into terrorism; Penalties carried on the proposed laws; Reaction of the Internet community.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics