Search Details

Word: hackers (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...didn't already think the life of Paris Hilton was a cautionary tale, consider the events of last week. A hacker swiped revealing photos and celebrity phone numbers from the reality-TV star's mobile phone and posted them on the Web, forcing Hilton to apologize to friends and family for the invasion of privacy, and offering the rest of us a valuable lesson: your mobile phone is more vulnerable than you ever realized. "What you have in your hand is a small, powerful computer connected to a public network," says Aloysius Cheang of the Singapore-based information-security nonprofit...

Author: /time Magazine | Title: Paris Hilton's Hack Attack | 2/28/2005 | See Source »

...around numbers for Anna Kournikova or Eminem in our address book, phones are often used to store sensitive information, says Adam Laurie, chief security officer for the London-based security firm The Bunker?including PIN numbers, alarm codes, and even safe combinations that could be lifted by a determined hacker...

Author: /time Magazine | Title: Paris Hilton's Hack Attack | 2/28/2005 | See Source »

Psst! Want to buy some pictures of Paris Hilton naked? Oh, you already have some. To the glee of Internet voyeurs, someone hacked Hilton's Sidekick II, a wireless phone/camera/PDA/Internet terminal sold by T-Mobile. The hacker then spilled its contents online, including numbers of celeb pals such as Ashlee Simpson and Eminem, along with photos of a topless Hilton cavorting with Eglantina Zingg, a VJ for MTV Latin America. The intruder didn't hack the Sidekick; he nailed the server that stored Hilton's personal data...

Author: /time Magazine | Title: A New Kind of Hack Attack | 2/27/2005 | See Source »

Bram Cohen was an unusual kid. While other first-graders were outside playing, he was writing computer code. By junior high, he could solve Rubik's Cube in a few minutes. A college dropout, he went on to co-found a hacker's convention in San Francisco. "I was always really weird," he says. Yet it was only two years ago, at age 27, that he learned why. Studying psychological conditions, he determined that he had Asperger syndrome, a mild form of autism, which explained his social difficulties and seemed tied to his obsession with puzzles. Cohen says...

Author: /time Magazine | Title: Downloading Hollywood | 2/6/2005 | See Source »

Myers added that the Heisenberg Uncertainty Principle guaranteed that a hacker could not steal the same code that would ultimately be received...

Author: By Alan J. Tabak, CRIMSON STAFF WRITER | Title: Scientists Work On Quantum Code | 8/13/2004 | See Source »

Previous | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | Next