hackers

hackers - News, Features, and Slideshows

Most popular

hackers in pictures

News about hackers
  • Hackers inside Chinese military steal U.S. corporate trade secrets

    By David Geer | 23 July, 2014 02:55

    In May, a grand jury in the Western District of Pennsylvania indicted five members of the Chinese military on charges of hacking and economic espionage, according to a May 19 U.S. Department of Justice media release. Per the same release, the targets were six U.S. enterprises operating in the solar products, nuclear power, and metals industries. The attacks began as early as 2006 and were carried out over many years and into this year, according to the same release.

  • With walls breached, document protection is the new security imperative

    By David Braue | 22 July, 2014 10:00

    Whether driven by hackers becoming more aggressive, or by new regulations increasing visibility around an ongoing problem, growing reports of data theft are prompting organisations to take urgent and proactive measures to protect business documents during every stage of their life cycle.

  • The week in security: Password managers, IT managers under fire over security disconnect

    By David Braue | 21 July, 2014 14:54

    Confirming warnings that password managers are |not as secure as you might think, single sign-on provider LastPass shared details of two vulnerabilities it found last year, while Australian retail site CatchOfTheDay was also behind the times as it revealed details of an exploit that occurred back in 2011.

  • Secure web services

    By Ashton Mills | 21 July, 2014 11:54

    If there's one thing the Snowden leaks have shown us, it's that security and privacy are largely an illusion. Yet, it's still possible to make it harder not just for criminals and hackers but also questionable government agencies with the right tools. Unfortunately, one of the key programs we all use to interface with the net is also the one of the primary vectors of attack -- the humble web browser.

  • Government-grade code found in criminal malware

    By Antone Gonsalves | 19 July, 2014 10:28

    Cybercriminals have inserted government-grade malware into run-of-the-mill ransomware and online banking Trojans to bolster their ability to avoid detection and block tampering.

Tutorials about hackers
  • How to protect your PC against devious security traps

    By Brad Chacos | 16 September, 2013 13:04

    Securing your PC against the malicious wilds of the Web isn't as simple as just keeping your antivirus software of choice up-to-date. In fact, the pervasiveness of security software has forced the bad guys to turn to increasingly clever tricks in their quest to "pwn" your PC.

Features about hackers
  • PC security: Your essential software toolbox

    By Eric Geier | 06 November, 2012 14:39 | 1 Comment

    Mobile malware is getting lots of attention these days, but you can’t forget about your PC’s security— after all, you probably still use it to pay bills, shop online, and store sensitive documents.

  • Top 10 hacking movies

    By Computerworld Staff | 18 April, 2011 10:38

    2011 so far has been filled with news of high-profile hacking - the Epsilon data breach, Microsoft and the various attempts of the nefarious Anonymous. Even the Australian Government copped a little unwanted interest. With this in mind, we thought it was time to track down the top ten Hollywood movies about hacking.

  • How dangerous could a hacked robot possibly be?

    By Robert McMillan | 08 October, 2009 18:54

    It seems like a question ripped from the back of a cheap sci-fi novel: What happens when the robots are turned against us?

Whitepapers about hackers

  • Helping Companies Fight Against Targeted Attacks

    Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.

  • How Threat Actors Steal Your Data

  • Targeted Attack Campaigns

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

IT Compliance Solutions

Enforce compliance consistently and cost-effectively across your organization.

Latest Jobs
Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.