You've Been Hacked!

Greengard, Samuel
April 2000
Workforce (10928332);Apr2000, Vol. 79 Issue 4, p24
Explores the intrusion of computer hackers in the security measures of Internet-based companies. Problems with security measures for the Internet; Measures to protect personal files on the Internet.


Related Articles

  • INTRODUCTION: PROLEGOMENA - HACKING CYBERSPACE.  // Hacking Cyberspace;Feb2001, p1 

    An introduction to the book "Hacking Cyberspace," by David J. Gunkel is presented.

  • What is Hacking? Grattafiori, Aaron "dyn" // Military Technology;2015, Vol. 39 Issue 11, p67 

    The article focuses on the concerns of hacking and cybersecurity, and mentions the impact of hackers on wireless communication and online banking.

  • The secret hacker wars. Vistica, Gregory L.; Thomas, Evan // Newsweek;6/1/1998, Vol. 131 Issue 22, p60 

    Reports on the vulnerability of the United States Pentagon, government agencies and private businesses to information warfare (IW). The threat of computer hackers working for foreign governments or terrorists; Cyber raids, such as one reported by the Federal Bureau of Investigation into the...

  • Update.  // Internal Auditor;Dec2014, Vol. 71 Issue 6, p15 

    Statistics are presented from "The Global State of Information Security Survey 2015," by professional services firm PricewaterhouseCoopers and the magazines "CIO" and "CSO," which include the rise of cybersecurity incidents and decline in cybersecurity spending by companies in 2014.

  • Securing the Internet of Things. O'Flaherty, Kate // SC Magazine: For IT Security Professionals (UK Edition);Jan/Feb2015, p12 

    The article suggests that (IoT) device could fuel corporate security risks and threats. Topics covered include the growth in scope and scale of the damage that can be done by IoT devices, the growth of IoT in the enterprise and the forms by which IoT poses threat to the consumer. The outlook...

  • IT cracks down on site hackers. Neil, Stephanie; Kerstetter, Neil; Crowley, Aileen // PC Week;06/07/99, Vol. 16 Issue 23, p18 

    Discusses the importance of proper security measures within a corporation to prevent employees from hacking into the corporate Web site. How the hacking of a Web site can undermine consumer confidence in the company; What proper Web site security requires; Why many information technology...

  • Monastic walls. Bencivenga, Jim // Christian Science Monitor;2/17/2000, Vol. 92 Issue 60, p11 

    Suggests that the knowledge represented on the Internet needs to be protected from computer hackers.

  • OPENHACK GETS CRACKED! Dyck, Timothy // eWeek;07/10/2000, Vol. 17 Issue 28, p1 

    Presents the results of the Openhack competition on Internet security. Penetration by a computer hacker of an electronic commerce storefront package; Applications of security information and updates to MiniVend users on the Internet; Proposed solutions to prevent security breaches on Web sites.

  • Cracker. Freedman, David H.; Mann, Charles C. // U.S. News & World Report;06/02/97, Vol. 122 Issue 21, p56 

    Reports on the computer cracker, or electronic burglar, who went by the name of Phantom Dialer or Phantomd. Computers he gained access to; How Phantomd accomplished his break-ins; His attempts to break into the US National Aeronautics and Space Administration supercomputers; The efforts of...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics