The Invisible Threat: M&A Hackers
- The Invisible Threat. NOTO, ANTHONY // Mergers & Acquisitions: The Dealermaker's Journal;Sep2011, Vol. 46 Issue 9, p14
The article reports on the prevalence of security breach cases in companies engaged in mergers & acquistions (M&A). It notes that M&A attracts cyber criminals and can expose companies to cyber-security risks as information moves freely both before and after the dealmaking which create soft spots...
- Attacked.Gov. Quittner, Jeremy // American Banker;6/15/2011, Vol. 176 Issue 92, p5
The article reports on cyberattacks on the International Monetary Fund, which the computer hacker group Lulz Security claimed responsibility for, and U.S. Senate and notes the security breach was made possible by a spear-phishing attack.
- Inside China's booming hacker industry. // Asian Pacific Post;2/18/2010, p14
The article reports on the growing hacker industry in China using Trojan horse programs and other malicious software.
- My password is not password. Jencius, Marty // Counseling Today;May2013, Vol. 55 Issue 11, p26
A personal narrative is presented which explores the author's experience of being hacked.
- 'Growth hackers' don't need marketing theories, just lots and lots of testing. DAVIES, RUSSELL // Campaign (UK);10/25/2013, p23
The author offers his views on growth hacking and its capacity to change.
- Hack Your City. // Spinoff;2013, p159
The article reports on the National Day of Civic Hacking that took place in more than 80 cities around the U.S. in the summer of 2013.
- Hackers Harassed. Quittner, Jeremy // American Banker;2/2/2011, Vol. 176 Issue 18, p5
Brief information is given about a hacking into Goatse Security, a group of computer hackers who allegedly had previously broken into the security of AT&T Inc.'s iPad services.
- Hacking Back. Wolfe, Daniel // American Banker;7/6/2011, Vol. 176 Issue 103, p5
The article reports a group of hackers calling themselves the A-Team seeks to uncover the identities of members of the hacking group Lulz Security.
- The Sony Hack Represents a New Form of Warfare. Schnurer, Eric // U.S. News Digital Weekly;12/19/2014, Vol. 6 Issue 51, p18
The author reflects on the act of a group of hackers believed to be under the command of North Korea who stole files and leaked private and proprietary information belonging to Sony Pictures Entertainment due to the company's comedy film "The Interview."