We use cookies and other similar technologies (Cookies) to enhance your experience and to provide you with relevant content and ads. By using our website, you are agreeing to the use of Cookies. You can change your settings at any time. Cookie Policy.

Recently in Hackers Category

A trans-Atlantic team of security researchers recently announced that they had hacked a heavily used component of browser security. The team was able to break into the Public Key Infrastructure (PKI), which is used to issue digital certificates for secure... Read More..
Categories:

Found an interesting article at PC World about Thomas J. Holt, an assistant professor in the Department of Criminal Justice at UNC (go Heels!), where for the past year they’ve been gathering information on the burgeoning online black market for... Read More..
Categories:

As almost every industry now seems to be doing mash-ups of different technology, you can now include spammers and cybercriminals in that group. A recent report by MessageLabs stated that recent email messages touting stocks have also come to include... Read More..
Categories:

According to an article at eweek.com, the new breed of cyberthieves know almost as much about how to track and trace a data breach or security slip as the experts do. And they are using this kind of knowledge to... Read More..
Categories:

The internet has become a major focus of criminal enterprises due to its hidden, anonymous nature, explains a recent report from McAfee. Criminals simply find it easier and more lucrative to steel from the comforts of a computer station than... Read More..
Categories: , ,

Hacker -- A Holiday Tale

user-pic
Vote 0 Votes
These last couple of months, in the cat and mouse game of computer security, I have to admit some days it really feels like the rodents are winning. Or, to paraphrase a certain holiday tale, Not a creature was stirring,... Read More..
Categories:

Microsoft is looking into a vulnerability in MS Word that could allow a hacker to gain control of a PC or Mac just from opening a malicious Word file attached to an email. According to this Microsoft advisory, so far... Read More..
Categories: , ,

When a bank robber is getting ready to rob a bank, you can bet the successful ones case out the bank beforehand and try to learn every possible thing they can about the bank’s strengths and weaknesses. Well, when a... Read More..
Categories: , ,

In a disturbing trend for the future of computer security, gone are the days of the lone hacker sitting in their basement looking to write the killer code that would one day make them famous, or better yet, infamous. Instead,... Read More..
Categories: ,

Virus of the Year (So Far)

user-pic
Vote 0 Votes
It’s been a long year for computer viruses, as malware and spam bots continue to increase at alarming rates. And, as my blog pointed out in the 5 Most Common Security Mistakes, it pays to, in so many words, know... Read More..
Categories:

Peter Schooff's blog is a daily look at what's going on in the world of computer security with an emphasis on how it affects businesses.

Peter Schooff

Peter Schooff is Contributing Editor at ebizQ, and manager of the ebizQ Forum. Contact him at pschooff@techtarget.com

Recently Commented On

Monthly Archives

Blogs

ADVERTISEMENT