Corporate Partners
hackers

hackers - News, Features, and Slideshows

hackers in pictures

News about hackers
  • The week in security: Celebrities face Apple's naked truth

    A major security breach was the last thing Apple needed in the leadup to the high-profile launch of its iPhone 6, and the "outraged” company was quick to argue that the leak of nude celebrity photos from its iCloud service was a targeted attack. Others said the leak was a reminder of the importance of two-factor authentication

    David Braue | 08 Sep | Read more

  • The week in security: Wearable tech shaking up security, privacy concerns

    If you're not concerned about the privacy implications of wearable technology, consider how you feel knowing that fitness-bracelet provider Jawbone was showing how its San Francisco customers felt the impact of the recent earthquake, based on when their bracelets said they woke up. On a similar note, a survey found that consumers are concerned about online security threats but do little to protect themselves.

    David Braue | 01 Sep | Read more

  • The week in security: Healthcare breach prompts govt security response

    Tax giant H&R Block took a big step with the |implementation of a new staff-onboarding system that uses a secure identity framework to confirm identity, while US shipping company United Parcel Service (UPS) was trying to confirm some other identities after its UPS Store subsidiary was |hit with a security breach that saw malware loaded on systems in 51 stores.

    David Braue | 27 Aug | Read more

  • Your living room is vulnerable to cyber attacks

    At the Black Hat security conference in Las Vegas earlier this month, researchers demonstrated how a Nest thermostat can be hacked, to show how easily connected appliances--the household technologies that make up the Internet of Things--can be compromised. When you look beyond the demo's hyperbolic headlines, it turns out the hack requires physical access to the Nest device, but the questions remains, "How vulnerable is IoT?"

    Tony Bradley | 23 Aug | Read more

  • The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

    It's that time of year again: The wonderful, terrifying week when hackers and security gurus descend upon Las Vegas to show off their skills and unleash presentation after presentation full of scary-sounding exploits. This year is no different. Over the previous week, we've heard tales of planes brought down by rogue code, snoops spying on your security cameras, and secretive, undetectable code that can turn any USB drive into an unstoppable malware vessel.

    Brad Chacos | 22 Aug | Read more

Tutorials about hackers
  • How to protect your PC against devious security traps

    Securing your PC against the malicious wilds of the Web isn't as simple as just keeping your antivirus software of choice up-to-date. In fact, the pervasiveness of security software has forced the bad guys to turn to increasingly clever tricks in their quest to "pwn" your PC.

    Brad Chacos | 16 Sep | Read more

Features about hackers

Whitepapers about hackers

  • Helping Companies Fight Against Targeted Attacks

    Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.

  • How Threat Actors Steal Your Data

  • Targeted Attack Campaigns

Market Place