The Mac Hacker Strikes Again

Greenberg, Andy
April 2010
Forbes Asia;Apr2010, Vol. 6 Issue 5, p30
The article focuses on computer security researcher Charlie A. Miller. It is stated that Miller's discovery of 20 security vulnerabilities was publicized by him in Apples software. It is mentioned that Miller has become the world's most prominent Mac hacker with a haul of bugs records. The article informs that in 2007 Miller joined Independent Security Evaluators where he was not able to sell bugs independently.


Related Articles

  • Send Internet Bad Guys Packing. Mink, Mary // Credit Union Executive Newsletter;2/7/2005, Vol. 31 Issue 3, p1 

    Reports on the arrest of a number of people allegedly involved in an international cybercrime ring. Target of the group; Agencies involved in the investigation; Implications of the prevailing cybercrime for the credit unions.

  • We're in cyberwar. smith, glenn // Investigate;Dec2012, Vol. 10 Issue 135, p36 

    The article discusses the challenges in dealing with computer hackers. It is said that hackers are a shadowy and mask their mischief, hide their identities and cover their trails across cyberspace. Interpol arrested 25 suspected members of the loose-knit Anonymous hacker group in a sweep across...

  • CYBERCRIME. Griffin, Ronald C. // Journal of International Commercial Law & Technology;Apr2012, Vol. 7 Issue 2, p136 

    This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.

  • Superzapping in Computerland. Golden, Frederic; Faflick, Philip; U.S., other // Time;1/12/1981, Vol. 117 Issue 2, p88 

    The article discusses the increase in computer crimes and the safety measures being taken by computer users. It is stated that several companies reported of their circuits being plagued by electronic interlopers and the police traced a gang of 13-year old children who hacked the systems. As...

  • Colleges Failing Computer Security.  // Information Management Journal;Jul/Aug2005, Vol. 39 Issue 4, p16 

    This article reports on the failing computer security at universities and colleges in the U.S. If recent events are any indication, some U.S. colleges need to be taught how to protect computers containing personal information. In April 2004, administrators at the University of California,...

  • EXCLUSIVE Fluffi Bunni's day job revealed.  // Computer Weekly;5/6/2003, p1 

    An IT supplier of some of the largest government IT projects in England is investigating how a suspected computer hacker, with a warrant out for his arrest, was manning its stand at the InfoSecurity Europe 2003 show last week as of May 6, 2003. Lynn Htun, the suspected brains behind the Fluffi...

  • Today's Attackers Can Find the Needle. Mimoso, Michael S.; Savage, Marcia // Information Security;Jun2006, Vol. 9 Issue 6, p24 

    This article discusses the type of for-profit crime plaguing the Internet. Today's hackers want customer data and intellectual property and they also want to infiltrate government agencies. Stealth technology that are being used by attackers include rootkits which are bundled in spyware. Ways to...

  • Sentencing policies for hackers too lenient. Goodwin, Bill // Computer Weekly;2/10/2004, p5 

    The head of the National Hi-Tech Crime Unit has called on the government in Great Britain and the courts to reform sentencing policy to reflect the damage caused by hackers breaking into government and private sector computer systems. Although hackers who engage in extortion or fraud are treated...

  • Haven for Hackers. Ho, Soyoung // Foreign Policy;Nov/Dec2004, Issue 145, p92 

    The article discusses the lack of computer security in South Korea. South Korea has the highest percentage of broadband Internet users in the world. Yet, the country's cybersecurity record is one of the world's worst. In 2003, 26,000 hacking incidents were reported to South Korea's Ministry...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics