Quantcast

Latest Hacker Stories

2013-09-29 23:04:22

idcloak is announcing the publication of a new article addressing Cyber crime, identity theft, and computer security. Dallas, Texas (PRWEB) September 29, 2013 idcloak has published a new article addressing computer security threats and the ways which netizens can keep themselves safe while browsing the web. The article, titled 'Computer Security Protection - Avoiding Electronic Identity Theft', aims to expose some of the methods used to carry out identity theft and internet...

2013-09-23 23:32:25

Telx Computers, one of the industry leaders in Computer IT support in Miami, announces new solutions for businesses wanting to ensure that their electronic files have the best protection possible. Miami, FL (PRWEB) September 23, 2013 It seems as though every day there is yet another story that hits the headlines about hackers breaking into computer systems and accessing highly sensitive material. Not even government files or the most tightly guarded military files seem to be safe from the...

2013-09-17 23:29:30

When a piece of software is popular, that means billions of devices are running it. But when those same popular programs get old enough to fall of the support schedule from their respective manufacturers, “it can be a real nightmare from a cyber security perspective,” says Joe Caruso, founder and CEO/CTO of Global Digital Forensics, discussing a recent industry article in PC World, “and the number of users that vulnerabilities in these “older versions” can affect can be almost...

2013-09-08 23:03:32

Firm now helping clients to uncover weak points within their networks. Dallas, TX (PRWEB) September 08, 2013 McCann Investigations, a Dallas-based firm that specializes in digital security and private investigations, recently announced that it now provides network vulnerability assessment services for its clients. These assessments are performed by McCann’s Dallas digital security experts to pinpoint vulnerable spots in a company’s digital networks. Hackers often exploit these...

Americans More Worried About Hacking Than Spying
2013-09-05 10:14:55

Michael Harper for redOrbit.com - Your Universe Online A new study from the Pew Research Center's Internet and American Life Project finds that more than half of Americans are concerned about being watched by their government, but nearly 90 percent of those living in the states are more concerned with facing a hacker attack or losing their money online. Many have used services to conceal their identity or create alternate identities to avoid being tracked by companies and pitched to or...

2013-08-19 23:22:13

In a news story that broke late last week, the Syrian Electronic Army apparently flexed some cyber-muscle by redirecting The Washington Post’s Web traffic to an alternate site to make a political point. Joe Caruso, CEO/CTO of Global Digital Forensics, talks about just how damaging an attack like this could be for an organization if leveraged for a different endgame, and some of the essential cyber security basics that can help defend against many of these types of attacks. New York, NY...

The Foundation Of Encryption Based On An Old Assumption
2013-08-14 10:03:33

Michael Harper for redOrbit.com - Your Universe Online Following last year’s numerous password dumps and this year’s Twitter hacks, website Ars Technica recently posed a challenge to a trio of hackers: How long does it take to unlock even the most secure passwords? In that challenge, the slowest of the three cracking experts was able to unlock 62 hashed and encrypted passwords in one hour, all while being “peppered” with questions from the Ars journalist. The resulting article...


Word of the Day
jument
  • A beast of burden; also, a beast in general.
'Jument' ultimately comes from the Latin 'jugum,' yoke.
Related