hackers

hackers - News, Features, and Slideshows

Most popular

hackers in pictures

News about hackers
  • The week in security: Healthcare breach prompts govt security response

    By David Braue | 27 August, 2014 13:06

    Tax giant H&R Block took a big step with the |implementation of a new staff-onboarding system that uses a secure identity framework to confirm identity, while US shipping company United Parcel Service (UPS) was trying to confirm some other identities after its UPS Store subsidiary was |hit with a security breach that saw malware loaded on systems in 51 stores.

  • Your living room is vulnerable to cyber attacks

    By Tony Bradley | 23 August, 2014 04:06

    At the Black Hat security conference in Las Vegas earlier this month, researchers demonstrated how a Nest thermostat can be hacked, to show how easily connected appliances--the household technologies that make up the Internet of Things--can be compromised. When you look beyond the demo's hyperbolic headlines, it turns out the hack requires physical access to the Nest device, but the questions remains, "How vulnerable is IoT?"

  • The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

    By Brad Chacos | 22 August, 2014 08:12

    It's that time of year again: The wonderful, terrifying week when hackers and security gurus descend upon Las Vegas to show off their skills and unleash presentation after presentation full of scary-sounding exploits. This year is no different. Over the previous week, we've heard tales of planes brought down by rogue code, snoops spying on your security cameras, and secretive, undetectable code that can turn any USB drive into an unstoppable malware vessel.

  • Why contractors' home networks are a security threat

    By Antone Gonsalves | 15 August, 2014 23:28

    Companies should take note of a recent poll that found contractors and IT administrators were the favorite targets of hackers.

  • Why the password-only era is over and what to do about it

    By Antone Gonsalves | 09 August, 2014 09:56

    The Russian crime ring that amassed more than a billion stolen passwords has shown why businesses have no choice but to add other forms of authentication in securing access to websites and corporate networks.

Tutorials about hackers
  • How to protect your PC against devious security traps

    By Brad Chacos | 16 September, 2013 13:04

    Securing your PC against the malicious wilds of the Web isn't as simple as just keeping your antivirus software of choice up-to-date. In fact, the pervasiveness of security software has forced the bad guys to turn to increasingly clever tricks in their quest to "pwn" your PC.

Features about hackers
  • PC security: Your essential software toolbox

    By Eric Geier | 06 November, 2012 14:39 | 1 Comment

    Mobile malware is getting lots of attention these days, but you can’t forget about your PC’s security— after all, you probably still use it to pay bills, shop online, and store sensitive documents.

  • Top 10 hacking movies

    By Computerworld Staff | 18 April, 2011 10:38

    2011 so far has been filled with news of high-profile hacking - the Epsilon data breach, Microsoft and the various attempts of the nefarious Anonymous. Even the Australian Government copped a little unwanted interest. With this in mind, we thought it was time to track down the top ten Hollywood movies about hacking.

  • How dangerous could a hacked robot possibly be?

    By Robert McMillan | 08 October, 2009 18:54

    It seems like a question ripped from the back of a cheap sci-fi novel: What happens when the robots are turned against us?

Whitepapers about hackers

  • Helping Companies Fight Against Targeted Attacks

    Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.

  • How Threat Actors Steal Your Data

  • Targeted Attack Campaigns

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Enterprise Virtualisation Security

Deep Security provides a comprehensive Server Security Platform giving organisations advanced protection for Physical, Virtual, and Cloud Servers.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.