hackers - News, Features, and Slideshows
- Secure web services
- The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences
- How hackers used Google in stealing corporate data
hackers in pictures
Tax giant H&R Block took a big step with the |implementation of a new staff-onboarding system that uses a secure identity framework to confirm identity, while US shipping company United Parcel Service (UPS) was trying to confirm some other identities after its UPS Store subsidiary was |hit with a security breach that saw malware loaded on systems in 51 stores.
At the Black Hat security conference in Las Vegas earlier this month, researchers demonstrated how a Nest thermostat can be hacked, to show how easily connected appliances--the household technologies that make up the Internet of Things--can be compromised. When you look beyond the demo's hyperbolic headlines, it turns out the hack requires physical access to the Nest device, but the questions remains, "How vulnerable is IoT?"
It's that time of year again: The wonderful, terrifying week when hackers and security gurus descend upon Las Vegas to show off their skills and unleash presentation after presentation full of scary-sounding exploits. This year is no different. Over the previous week, we've heard tales of planes brought down by rogue code, snoops spying on your security cameras, and secretive, undetectable code that can turn any USB drive into an unstoppable malware vessel.
Companies should take note of a recent poll that found contractors and IT administrators were the favorite targets of hackers.
The Russian crime ring that amassed more than a billion stolen passwords has shown why businesses have no choice but to add other forms of authentication in securing access to websites and corporate networks.
Securing your PC against the malicious wilds of the Web isn't as simple as just keeping your antivirus software of choice up-to-date. In fact, the pervasiveness of security software has forced the bad guys to turn to increasingly clever tricks in their quest to "pwn" your PC.
Mobile malware is getting lots of attention these days, but you can’t forget about your PC’s security— after all, you probably still use it to pay bills, shop online, and store sensitive documents.
2011 so far has been filled with news of high-profile hacking - the Epsilon data breach, Microsoft and the various attempts of the nefarious Anonymous. Even the Australian Government copped a little unwanted interest. With this in mind, we thought it was time to track down the top ten Hollywood movies about hacking.
It seems like a question ripped from the back of a cheap sci-fi novel: What happens when the robots are turned against us?
Whitepapers about hackers
Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.
Sign up now »
Deep Security provides a comprehensive Server Security Platform giving organisations advanced protection for Physical, Virtual, and Cloud Servers.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.