Garfinkel, Simson
May 2003
Technology Review;May2003, Vol. 106 Issue 4, p28
Discusses the possible role of proof-of-concept tests in computer-related crimes on information technology systems. Correlation of the tests with that of computer viruses; Speculations regarding the origin and purpose for the proof-of-concept tests.


Related Articles

  • IT'S ALREADY A VERY INTERESTING YEAR. McCormick, John // Baseline;Mar2006, Issue 56, p14 

    The article comments on the condition of information technology companies as of March 2006. It discusses the reaction of the public to the news that computer worms are targeting Mac computers. It also discusses the technology challenges of the U.S. government. It enumerates the U.S. technology...

  • Viruses and hackers and worms ... oh my! Brandl, Dennis // Control Engineering;Nov2003, Vol. 50 Issue 11, p58 

    Offers solutions for addressing computer viruses and worms in the Internet technology environment. Detection in the interior and protection at each system; Limitations of virus protection software; Prime targets for infection; Emphasis on control system network design.

  • `Love letter' postmortem. Fonseca, Brian // InfoWorld;05/15/2000, Vol. 22 Issue 20, p12 

    Focuses on the aftermath of the `I Love You' computer virus in the United States. Measures taken by some information technology managers; Comments from anti-virus vendors; Recommendation to anti-virus vendors.

  • IN BRIEF.  // New Media Age;7/7/2005, p13 

    Presents an update on the information technology sector in Great Britain as of July 7, 2005. Outlook of adults on the safety and reliability of mobile technology, according to a study by Tertio SMS; Visits to the Web site of the Live 8 event; Prevalence of Exploit/Mhtredir.gen computer virus.

  • IT leaders say UK laws do not deter hackers. Cushing, Karl // Computer Weekly;7/8/2003, p5 

    Seventy seven per cent of information technology chiefs said Great Britain's computer crime laws are not very effective at deterring hackers and virus writers in a recent poll. Not one of the 366 respondents felt existing laws were "very effective" while just 23% felt they were "quite...

  • Beware the enemy lurking.  // U.S. Banker;Aug2005, Vol. 115 Issue 8, p18 

    Focuses on decline of the global financial institutions reported attacks on their information technology systems from external sources. Improvement of using anti-virus products; Adoption of virtual private networks; Purchase of content-filtering and monitoring products; Increase in the number of...

  • ONE LINERS from….  // Tech Trader;Jul2012, Vol. 4 Issue 6, p6 

    An interview with chief executive officer (CEO) Eugene Kaspersky of Kaspersky Lab is presented. When asked about his biggest career challenge, he refers to finding solutions to cyber threats from computer viruses. He admits getting paranoid working in information technology (IT) security for...

  • The RSA Security Breach -- 12 Months Down The Technology Turnpike. Kemshall, Andy // Database & Network Journal;Apr2012, Vol. 42 Issue 2, p21 

    The author reflects on the attack of the RSA Security Inc.'s systems that compromise millions of its SecurID hardware tokens in the U.S. in March 2011. He outlines the impact of the attack, prompting the information technology (IT) security provider to overhaul its manufacturing and SecurID...

  • Why prevention is better than cure. Sterlicchi, John // SC Magazine: For IT Security Professionals (UK Edition);Jun2004, p12 

    This article reports that from government departments in South Africa to the British Coast Guard to Taiwan's Postal Service to Delta Airlines, American Express and universities in the U.S., the Sasser computer virus wreaked havoc and interrupted services in May 2004. Articles about the virus...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics