Search Details

Word: hackers (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...Taiwan, its navy and air force are increasingly expanding their reach in ways that suggest it is flexing its military might beyond that island, which mainland China regards as a rebel province. Last year, Beijing tested an anti-satellite weapon and Pentagon officials believe it has been behind hacker attacks on Pentagon computer systems. The report says China's long-range strategic missile force - capable of hitting the U.S. - continues to grow, as does its arsenal of ship-killing cruise missiles...

Author: /time Magazine | Title: That Murky Threat from China | 3/4/2008 | See Source »

...file also included a note from the hacker, self-identified as “kaboom73,” apparently deriding the vulnerability of the GSAS site’s server...

Author: By Byran Dai, CONTRIBUTING WRITER | Title: Flaw in GSAS Site Security Exposed | 2/20/2008 | See Source »

That idyllic thought was shaken this weekend when a hacker accessed the Web site of the Graduate School for Arts and Sciences (GSAS) and made its secure server available for download through the popular BitTorrent peer-to-peer file sharing site, “The Pirate Bay,” where users can easily obtain large files...

Author: By Byran Dai, CONTRIBUTING WRITER | Title: Flaw in GSAS Site Security Exposed | 2/20/2008 | See Source »

...hacker was able to gain access to the server by exploiting a “computer that had been hijacked, in order to attack our server from [his own] computer,” Selsby explained. Doing so allowed the hacker to mask his identity, and there would be “no way to get a definitive IP address” that the hacker used...

Author: By Byran Dai, CONTRIBUTING WRITER | Title: Flaw in GSAS Site Security Exposed | 2/20/2008 | See Source »

...uploaded file was accompanied by a message from the site’s hacker stating that the information was released to expose the vulnerability of Harvard’s servers...

Author: By Abby D. Phillip, CRIMSON STAFF WRITER | Title: Hackers Break Into GSAS Computer Network, Post Protected Content to Downloading Web Site | 2/19/2008 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | Next