Some hackers identify vulnerabilities – serving as the internet’s immune system – but new EU legislation fails to recognise their value, argues MEP
Browsing: Hacking
It may seem strange to say, but there are probably a lot of people involved in IT security who long for the “good old days” when the threats were limited to computer viruses getting downloaded through email and hackers trying to break through a firewall.
Last week, Denmark’s national police revealed that, in the summer of 2012, hackers might have stolen and modified information from the police driving license register, including the personal identity number register (CPR).
Mobile network giant Telefonica has launched new business unit Eleven Paths, which promises unprovoked attacks on customers every day, in the interests of greater security.
Is the National Security Agency (NSA) really “wiretapping” the Internet? Accused accomplices Microsoft and Google deny that they have any part in it and the core evidence isn’t holding up that well under closer examination.
Lawmakers in the U.S. have proposed legislation which will deny hackers entry to the United States and freeze the assets of foreign nationals.
There was a time when the Windows PC was the computer platform that was most vulnerable to malware and hacking. Although some malicious hackers were targeting Nokia’s Symbian mobile operating system
Dubai: Hackers today don’t even need to gain access to a target’s computer and could use “social engineering” on the target when it comes to disclosing information, Kevin Mitnick, the hacker-turned international cyber security consultant and the keynote speaker at the inaugural Gulf Information Security Expo and Conference (Gisec) Conference taking place at Dubai World Trade Centre, said.
Cyber hackers have already shown what damage they can do, but this may be the scariest hacking story yet, if it came true.
This is the first of a two-part series on the techniques and tradecraft of ethical hackers. The second part will appear later this week.