Hacker Company articles over last 30 days

- articles last 30 days - articles per day
Mentioned in this news Places Companies People
2014/09/18 19:12
2014/09/18 19:12
34m
Federal pricing information for software and services sold by a big-data company known for its relationships with the CIA and the National Security Agency has made its way onto a social news website...
2014/09/18 19:12
2014/09/18 19:12
Latest videos
2014/09/18 16:39
2014/09/18 16:39
3h
... the US bank attacked by Iran two years ago. After the hacks, some of the banks contacted his company and they begin to talk to banks about possible solutions to this problem. “We saw this...
2014/09/18 16:12
2014/09/18 16:12
3h
... the world were canceled Monday as pilots kicked off a weeklong strike, angry that the company is shifting jobs and operations to a low-cost carrier to better keep up with... Air France...
2014/09/18 14:42
2014/09/18 14:42
5h
... a new website launched on Wednesday that details how Apple uses your data, the Cupertino company made it clear that your personal information is (sort of) safe from law enforcement and the...
2014/09/18 14:31
2014/09/18 14:31
5h
... nearly $3 million since April. That's more than five times the projected loss. But port and company officials said Wednesday they are confident the business is going to work. Fewer Ohioans...
2014/09/18 13:42
2014/09/18 13:42
6h
... Rapid7’s Tod Beardsley explained over email. This would then allow the hacker to inject whatever JavaScript they wanted across other sites. From this point on, the...
2014/09/18 03:38
2014/09/18 03:38
16h
... Apple updated the diagnostic tools to prevent that kind of persistent remote access. The company did not credit Zdziarski for exposing the problem, although it did credit other security...
2014/09/18 03:28
2014/09/18 03:28
16h
SEATTLE -- A pair of self proclaimed "ethical hackers" have discovered what they call a "logic flaw" with the social networking site LinkedIn. The flaw could allow anyone with just a basic grasp of...
2014/09/17 22:22
2014/09/17 22:22
21h
Twitter's recently announced bug bounty program has helped the company identify and patch a serious vulnerability that could have potentially disrupted advertising on its platform. The flaw would...
2014/09/17 22:09
2014/09/17 22:09
21h
Ultrasonic AG's CFO, Chi Kwong Clifford Chan, told the board yesterday that the company's CEO, Qingyong Wu, and COO, Minghong Wu, had become unreachable over the weekend and that their accountants had...
2014/09/17 19:47
2014/09/17 19:47
1d
Friday) The Zero Theorem (R) The latest film by Terry Gilliam stars Christoph Waltz as a computer hacker whose attempts to discover the secret of the universe are thwarted by a mysterious manager...
2014/09/17 16:09
2014/09/17 16:09
1d
Comes with a free nylon belt holster." On another site, a user calling himself “The Facebook Hacker from Belgium” offers to hack into any social media account for 0.86 Bitcoin (the...
2014/09/17 11:14
2014/09/17 11:14
1d
... to be a gem. It was her first mainstream film and she played the role of a pharmaceutical company employee who ends up being a bomb-strapped victim of a hacker. There’s no doubt that Lauren...
2014/09/17 10:39
2014/09/17 10:39
1d
... security issues, inside and outside the classroom. For his part, Borohovski, a lifelong hacker, took many classes on security and wrote his senior thesis on the topic of Web...
2014/09/17 03:46
2014/09/17 03:46
1d
The Cryptolocker software. Thousands of Australian computers are being locked up by hackers using malicious software that encrypts files and asks for a ransom to make them available again. Fairfax...
2014/09/17 03:19
2014/09/17 03:19
1d
... plant could be attacked to precipitate a meltdown, he said. On a more consumer level, a hacker could attack an Internet-connected pacemaker or an insulin pump to bring potentially fatal...
2014/09/17 02:42
2014/09/17 02:42
1d
... of Bitcoin’s anonymous creator who is known only by the pseudonym “Satoshi Nakamoto.” A hacker or hackers got into Nakamoto’s email account — satoshin@gmx.com — and announced plans to...
2014/09/16 17:37
2014/09/16 17:37
2d
Benjamin Daniel Mussler has discovered a vulnerability in Amazon’s Kindle e-reader that lets hackers hide malicious code in a book’s metadata that compromises their Amazon account. Mr Mussler...
2014/09/16 17:22
2014/09/16 17:22
2d
... the way these images found their way on to the Internet. The first suggests that a hacker, or hackers, discovered a way into Apple’s iCloud: an application that allows users to store...
2014/09/16 16:57
2014/09/16 16:57
2d
M1 "took swift and necessary action" once the vulnerability was detected. Another IT security company Trend Micro told Channel NewsAsia that security gaps for enterprise Web applications like...
2014/09/18 19:12
2014/09/18 19:12
Latest from Twitter