TITLE

Who's been looking at your data?

AUTHOR(S)
Butler, Declan
PUB. DATE
August 2002
SOURCE
Nature;8/8/2002, Vol. 418 Issue 6898, p580
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Reports on the breach of academic computer security in the U.S. Web sites that were hit by distributed denial-of-service attacks launched from computers in schools; Threat posed by cyber-terrorists; Security measures used by researchers to protect the people and homes.
ACCESSION #
7236557

 

Related Articles

  • Virus Writers Squabble In Virtual Playground.  // Database & Network Journal;Apr2003, Vol. 33 Issue 2, p23 

    Reports on the Sophos PLC's development of an e-mail-aware worm, W32/Yaha-Q, written to counter the Pakistani hackers defacing Web sites based in India. Mechanism of the e-mail-aware worm; Ability of Yah-Q to activate a number of different payloads on infected computers; Contact information.

  • Web application hacking: exposing your backend.  // Manager: British Journal of Administrative Management;Mar/Apr2004, Issue 40, p28 

    This article presents various issues related to web application hacking. Web applications invite public access to an organisation's most sensitive data. Customer information, transaction information and even proprietary corporate data can be accessed through web applications. Access to the...

  • Untitled. Mukerji, Aadrita // Computer Weekly;1/12/2010, p41 

    The article reports that computer hackers recently attacked the website of Iranian president Mahmoud Ahmadinejad and Spain's European Union website.

  • Hacked Off. Taylor, Jeff A. // Reason;May2000, Vol. 32 Issue 1, p8 

    Comments on the pseudo-hack perpetrated by hackers on several high-profile electronic Web sites in February 2000 which does not qualify as a true hack as their systems were never actually penetrated. Effect of the attack on the sites; Term of the Internet culture on such attacks; Views on the...

  • Hunting the hackers. Levy, Steven; Stone, Brad // Bulletin with Newsweek;02/22/2000, Vol. 118 Issue 6212, p80 

    Reports on the February 2000 computer hacking attack experienced by several Web sites in the United States. Background on the denial of service (DOS) attack experienced by Yahoo, eBay and other electronic commerce Web sites; US Federal Bureau of Investigation's efforts to locate the hackers.

  • Inside the Indo-Pak Cyber Wars.  // India Today;3/21/2011, p6 

    The article deals with a proxy cyber war using hired hackers recently waged by the "Indian Cyber Army" (ICA) against the "Pakistan Cyber Army" (PCA), the rival intelligence agencies of India and Pakistan. It describes the cyber attacks which erupted on November 26, 2010. The cyber attacks were...

  • Making Computer Crime Count. Goodman, Marc // FBI Law Enforcement Bulletin;Aug2001, Vol. 70 Issue 8, p10 

    Provides information on computer crimes in the United States. Legislation governing computer crimes in the country; Statistics of computer crimes; Information on computer hacking; Problems posed by unreported computer crimes; Details of computer security and confidentiality.

  • Paris school offers primer for cyberpirates. van der Laan, Nanette // Christian Science Monitor;12/3/2001, Vol. 94 Issue 7, p1 

    Discusses the Zi Hackademy school in Paris, France, which teaches computer hacking methods. Fear that the teaching of the information will lead to computer crimes; Monitoring of the school by the police; Idea that the information is provided for self defense of Web sites and computers.

  • GLOBAL NOTE.  // Time International (Atlantic Edition);6/4/2007, Vol. 169 Issue 23, p11 

    This article explains that the country of Estonia experienced 100 separate attacks on its computers systems during April, 2007. They have accused Russia of organizing the strikes, because Estonian authorities decided to take down a Soviet war memorial. Russia has denied any involvement in the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics