Search Details

Word: hacker (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...Byrne went down with an injury. In the second game of a Sunday doubleheader in Providence, Harvard desperately needed a win to keep pace with the Bears in the standings Jenkins came up to the plate in the fourth inning with his team nursing a narrow lead. Ever the hacker, Jenkins unloaded on—what else—a first-pitch fastball and saw it soar out towards the tall net above the fence in left field. “As soon as I hit it, I took two hard steps out of the box and I looked...

Author: By Jonathan Lehman, CRIMSON STAFF WRITER | Title: Making the Leap | 3/19/2008 | See Source »

...Harvard Medical School (HMS) study released last week shows that Implantable Medical Devices (IMD), such as pacemakers, could be high-risk targets for hackers. Researchers from the University of Massachusetts, University of Washington, Beth-Israel Deaconess Hospital, and Harvard Medical School found that hackers could intercept patient information and reprogram the device, potentially endangering the patient by sending additional electrical signals to the heart. The researchers presented their findings last Wednesday, in anticipation of the publication of their paper, “Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses.” The study focused...

Author: By Bilal A. Siddiqui, CRIMSON STAFF WRITER | Title: Study: Pacemakers Could Be Hacked | 3/18/2008 | See Source »

...students, including 6,600 Social Security numbers and 500 Harvard ID numbers, the University said yesterday. According to the University’s Chief Information Officer Daniel D. Moriarty, when Harvard realized after a preliminary scan of the disseminated information that “the same methods that the hacker used could have exposed other data,” they began cataloguing the rest of the server’s contents. “Regrettably, that’s when we found this sensitive information,” he said. “Those initial scans did not find...

Author: By Clifford M. Marks, CRIMSON STAFF WRITER | Title: Personal Data at Risk in Hack | 3/13/2008 | See Source »

...Taiwan, its navy and air force are increasingly expanding their reach in ways that suggest it is flexing its military might beyond that island, which mainland China regards as a rebel province. Last year, Beijing tested an anti-satellite weapon and Pentagon officials believe it has been behind hacker attacks on Pentagon computer systems. The report says China's long-range strategic missile force - capable of hitting the U.S. - continues to grow, as does its arsenal of ship-killing cruise missiles...

Author: /time Magazine | Title: That Murky Threat from China | 3/4/2008 | See Source »

...hacker was able to gain access to the server by exploiting a “computer that had been hijacked, in order to attack our server from [his own] computer,” Selsby explained. Doing so allowed the hacker to mask his identity, and there would be “no way to get a definitive IP address” that the hacker used...

Author: By Byran Dai, CONTRIBUTING WRITER | Title: Flaw in GSAS Site Security Exposed | 2/20/2008 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | Next