Word: hacks
(lookup in dictionary)
(lookup stats)
Dates: during 1990-1999
Sort By: most recent first
(reverse)
...turncoat Aldrich Ames was uncovered, the Directorate took its E-mail address list off the main computer system, fearing that future moles could browse through it to identify case officers. (Fortunately for the cia, Ames told agency investigators after he was captured that the Russians never asked him to hack the system, mainly because his computer-illiterate handlers were clueless about...
...audited for suspicious activity, such as an unusual number of log-ins after hours or repeated failures to have a password accepted, usually symptomatic of a hacker testing out a host of computer-generated passwords. During their first polygraph, job applicants are now asked if they've ever tried hacking. The agency will also stage "red-team" exercises, during which computer experts try to hack the system from terminals in the building, probing for weaknesses...
Cyber bandits keep probing nonetheless. TIME has learned that CIA security officers have caught at least half a dozen agency employees and contractors who on a lark have tried to hack parts of the agency's computer system that are closed off to them. A hacker from Canada almost daily tries to break past the CIA's Internet link to get to the agency's secret files. He once used the password "Clinton," thinking that would give him access to any secret. It didn't. "We know who he is," a CIA official said with a smile. "But there...
...haven't been getting their tax bills. If they don't pay $20,000 in back taxes in four days, the house will be auctioned off. In typical Brady fashion, Carol (Shelly Long, who must really need work) and Mike try to keep this from the kids. Cindy (Olivia Hack, with a perfect lisp) finds out and tattles, which isn't much of a surprise. The six kids then spend the rest of the film brain-storming money-making schemes...
...arrest yesterday of Kevin Mitnick ? described as the world''s most notorious computer hacker ? raises troubling new questions about commercial interactions in cyberspace, says TIME technology writer Josh Quittner. Mitnick, 31, was able over the years to hack into various computer systems and get access to privileged information from big-name companies like Digital, Motorola and NEC. He also obtained a copy of credit card numbers of 20,000 members of Netcom, a San Jose-based Internet provider. "If Netcom can''t keep those numbers secure, how can L.L. Bean?" says Quittner. Most troubling is the fact Mitnick...