Search Details

Word: hackers (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...loophole and bringing in auditors to assess the security of the network. “They made a lot of really good changes,” says Nettifee of the fallout.The point, however, remains the same. Information transmitted over the internet is inherently vulnerable, whether one is a sophisticated hacker or simply a layman with access to a web browser. Even with a sophisticated security systems and round-the-clock experts at its disposal, Harvard is unable to protect student information all the time. “The biggest problem is people not thinking about things,” says...

Author: By Adam P Schneider, CRIMSON STAFF WRITER | Title: How Much About You Is Out There? | 2/8/2006 | See Source »

...rise of the hacker as extortionist reflects a broader change in hacker culture. "It used to be teenagers looking for bragging rights," says Johannes Ullrich, chief research officer for the SANS Institute, a security think tank. "Now it's done for profit." And it's done from anywhere in the world, so catching the bad guys can be complicated. Ullrich estimates that there are 10 or 20 cases a day, compared with virtually none three years ago. More sophisticated viruses, spyware and other forms of malicious code, meanwhile, are the new weapons of choice for committing identity theft, bank fraud...

Author: /time Magazine | Title: Shock Absorbers | 2/7/2006 | See Source »

...Michael Kramer, a former fashion-industry executive, was the victim of a hacker who stole his identity and went on a shopping spree with his credit card info. It was one of his first encounters with the wilds of the Internet. Kramer, 43, whose background is in marketing, saw opportunity in the crime. "The initial idea was to set up voice authentication to avoid that kind of thing again," he says...

Author: /time Magazine | Title: The Voice Of Internet Security | 12/4/2005 | See Source »

...research centers around the world, and the student body became markedly more diverse during that time. A required course in leadership and corporate accountability was also added.But Clark’s deanship also saw controversy last spring when dozens of prospective students, tipped off by an online hacker, tried to gain unauthorized access to a website detailing their admissions status at HBS as well as at five other top business schools.Less than a week after the breaches became public, HBS decided it would categorically reject all 119 applicants who had attempted to check their admissions status—a move...

Author: By Daniel J. T. Schuker, CRIMSON STAFF WRITER | Title: Datar Seen as Favorite for Next HBS Dean | 10/14/2005 | See Source »

...defamation and wrongful termination. The FBI has acknowledged working with him: evidence collected by TIME shows that FBI agents repeatedly assured him he was providing important information to them. Less clear is whether he was sleuthing with the tacit consent of the government or operating as a rogue hacker. At the same time, the bureau was also investigating his actions before ultimately deciding not to prosecute him. The FBI would not tell TIME exactly what, if anything, it thought Carpenter had done wrong. Federal cyberintelligence agents use information from freelance sources like Carpenter at times but are also extremely leery...

Author: /time Magazine | Title: The Invasion of the Chinese Cyberspies | 8/29/2005 | See Source »

Previous | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | Next