The Mac Hacker Strikes Again

Greenberg, Andy
April 2010
Forbes Asia;Apr2010, Vol. 6 Issue 5, p30
The article focuses on computer security researcher Charlie A. Miller. It is stated that Miller's discovery of 20 security vulnerabilities was publicized by him in Apples software. It is mentioned that Miller has become the world's most prominent Mac hacker with a haul of bugs records. The article informs that in 2007 Miller joined Independent Security Evaluators where he was not able to sell bugs independently.


Related Articles

  • Send Internet Bad Guys Packing. Mink, Mary // Credit Union Executive Newsletter;2/7/2005, Vol. 31 Issue 3, p1 

    Reports on the arrest of a number of people allegedly involved in an international cybercrime ring. Target of the group; Agencies involved in the investigation; Implications of the prevailing cybercrime for the credit unions.

  • Online Crime Costs Rising.  // Information Management Journal;Jul/Aug2004, Vol. 38 Issue 4, p14 

    A new survey reveals that online criminals are attacking corporate and government networks more frequently, and it cost businesses a lot of money in 2003. The survey of 500 computer security executives conducted by CSO magazine in cooperation with the U.S. Secret Service and the CERT...

  • An Efficient Analysis of Honeypot Data Based on Markov Chain. Kimou, K. P.; Barry, B.; Babri, M.; Oumtanaga, S.; Kadjo, L. // Journal of Applied Sciences;2010, Vol. 10 Issue 3, p196 

    The aim of this study is to provide a behavioral modeling of hackers for a better predisposition to secure the Internet. Thus, using data collected from the experimental platform of CAD Ho project, an efficient analysis of these data has been made. This preliminary study has identified the...

  • We're in cyberwar. smith, glenn // Investigate;Dec2012, Vol. 10 Issue 135, p36 

    The article discusses the challenges in dealing with computer hackers. It is said that hackers are a shadowy and mask their mischief, hide their identities and cover their trails across cyberspace. Interpol arrested 25 suspected members of the loose-knit Anonymous hacker group in a sweep across...

  • CYBERCRIME. Griffin, Ronald C. // Journal of International Commercial Law & Technology;Apr2012, Vol. 7 Issue 2, p136 

    This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.

  • Superzapping in Computerland. Golden, Frederic; Faflick, Philip; U.S., other // Time;1/12/1981, Vol. 117 Issue 2, p88 

    The article discusses the increase in computer crimes and the safety measures being taken by computer users. It is stated that several companies reported of their circuits being plagued by electronic interlopers and the police traced a gang of 13-year old children who hacked the systems. As...

  • Hackers face longer jail sentences under plans to update the Computer Misuse Act. Goodwin, Bill // Computer Weekly;7/6/2004, p8 

    New laws will give Great Britain police powers to extradite criminals from overseas. The government has committed to introducing tougher computer crime laws that could quadruple prison sentences for hackers. The new laws could also give police stronger powers to extradite computer criminals...

  • Colleges Failing Computer Security.  // Information Management Journal;Jul/Aug2005, Vol. 39 Issue 4, p16 

    This article reports on the failing computer security at universities and colleges in the U.S. If recent events are any indication, some U.S. colleges need to be taught how to protect computers containing personal information. In April 2004, administrators at the University of California,...

  • EXCLUSIVE Fluffi Bunni's day job revealed.  // Computer Weekly;5/6/2003, p1 

    An IT supplier of some of the largest government IT projects in England is investigating how a suspected computer hacker, with a warrant out for his arrest, was manning its stand at the InfoSecurity Europe 2003 show last week as of May 6, 2003. Lynn Htun, the suspected brains behind the Fluffi...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics