You've Been Hacked!
- INTRODUCTION: PROLEGOMENA - HACKING CYBERSPACE. // Hacking Cyberspace;Feb2001, p1
An introduction to the book "Hacking Cyberspace," by David J. Gunkel is presented.
- What is Hacking? Grattafiori, Aaron "dyn" // Military Technology;2015, Vol. 39 Issue 11, p67
The article focuses on the concerns of hacking and cybersecurity, and mentions the impact of hackers on wireless communication and online banking.
- The secret hacker wars. Vistica, Gregory L.; Thomas, Evan // Newsweek;6/1/1998, Vol. 131 Issue 22, p60
Reports on the vulnerability of the United States Pentagon, government agencies and private businesses to information warfare (IW). The threat of computer hackers working for foreign governments or terrorists; Cyber raids, such as one reported by the Federal Bureau of Investigation into the...
- Update. // Internal Auditor;Dec2014, Vol. 71 Issue 6, p15
Statistics are presented from "The Global State of Information Security Survey 2015," by professional services firm PricewaterhouseCoopers and the magazines "CIO" and "CSO," which include the rise of cybersecurity incidents and decline in cybersecurity spending by companies in 2014.
- Securing the Internet of Things. O'Flaherty, Kate // SC Magazine: For IT Security Professionals (UK Edition);Jan/Feb2015, p12
The article suggests that (IoT) device could fuel corporate security risks and threats. Topics covered include the growth in scope and scale of the damage that can be done by IoT devices, the growth of IoT in the enterprise and the forms by which IoT poses threat to the consumer. The outlook...
- IT cracks down on site hackers. Neil, Stephanie; Kerstetter, Neil; Crowley, Aileen // PC Week;06/07/99, Vol. 16 Issue 23, p18
Discusses the importance of proper security measures within a corporation to prevent employees from hacking into the corporate Web site. How the hacking of a Web site can undermine consumer confidence in the company; What proper Web site security requires; Why many information technology...
- Monastic walls. Bencivenga, Jim // Christian Science Monitor;2/17/2000, Vol. 92 Issue 60, p11
Suggests that the knowledge represented on the Internet needs to be protected from computer hackers.
- OPENHACK GETS CRACKED! Dyck, Timothy // eWeek;07/10/2000, Vol. 17 Issue 28, p1
Presents the results of the Openhack competition on Internet security. Penetration by a computer hacker of an electronic commerce storefront package; Applications of security information and updates to MiniVend users on the Internet; Proposed solutions to prevent security breaches on Web sites.
- Cracker. Freedman, David H.; Mann, Charles C. // U.S. News & World Report;06/02/97, Vol. 122 Issue 21, p56
Reports on the computer cracker, or electronic burglar, who went by the name of Phantom Dialer or Phantomd. Computers he gained access to; How Phantomd accomplished his break-ins; His attempts to break into the US National Aeronautics and Space Administration supercomputers; The efforts of...