Search Details

Word: hacker (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...memoranda, which were obtained by a hacker in March 2003, acknowledge serious flaws in electronic voting machines distributed by Diebold in 37 states, including Massachusetts...

Author: By Zachary M. Seward, CONTRIBUTING WRITER | Title: Student Will Not Be Disciplined for Memos | 11/24/2003 | See Source »

...guard their computers against novice vandals planting viruses or against more advanced intruders leeching your computing power to launch a cyberattack on someone else. Despite the spate of devastating viruses this year--Slammer in January, Blaster and Sobig in August--the threat has evolved past the 17-year-old hacker, past the lone thief who steals and reveals credit-card data. Businesses must now watch for organized-crime groups adept at lifting valuable, private information and extorting money with it. The Federal Government and key industries must keep aspiring cyberterrorists from busting open dams or shorting out our electric grid...

Author: /time Magazine | Title: The Code Warriors | 11/10/2003 | See Source »

Diebold has claimed that the posting the documents—which were stolen by a hacker in March 2003—is a copyright violation...

Author: By David Zhou, CONTRIBUTING WRITER | Title: Student Accused of Violating Copyrights | 11/10/2003 | See Source »

...skilled hacker could disable a network of several plants without ever entering a facility by seizing digital controls at the point where computers meet the infrastructure they run. The weak links are the devices called supervisory-control and data-acquisition systems, which monitor power flows. Much of the information terrorists would need to hack into them is available on the Internet. And since energy deregulation, many companies have adopted common platforms for their computer systems. The control systems often lack rudimentary security, leaving technical specifications and flaws on view to potential attackers...

Author: /time Magazine | Title: Blackout '03: An Invitation To Terrorists? | 8/25/2003 | See Source »

...said most of the attacks were “denial of service attacks,” in which a hacker searches for a vulnerable computer on a network and floods the system with activity. This influx can slow down and even temporarily shut down a computer network...

Author: By Laura L. Krug, CRIMSON STAFF WRITER | Title: Hacking Attacks Bring Down FAS Network | 7/11/2003 | See Source »

Previous | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | Next