Lock picking, hacking, and dongles on the Sector show floor

In years of covering many technology conferences across North America, I have to say there are few exhibitor show floors as interesting as the one put on at Sector. Rather than the endless

Published on: October 10th, 2013 Brian Jackson

How to become an ethical hacker

Do viruses, DDoS attacks, or buffer overflows tickle your fancy? If so, you might consider becoming a legal hacker, aka an ethical hacker, "white hat" hacker, or penetration tester. Businesses and government-related organizations

Published on: February 16th, 2012 Eric Geier

Top 10 hacking tricks of 2010

A Web hack that can endanger online banking transactions is ranked the No. 1 new Web hacking technique for 2010 in a top 10 list selected by a panel of experts and open

Published on: January 25th, 2011 Tim Greene

Researcher to demonstrate smartphone radio hack

More than three years after the iPhone was first hacked, computer security experts think they've found a whole new way to break into mobile phones -- one that could become a big headache

Published on: January 18th, 2011 Robert McMillan

Five easy ways to protect your online privacy

Is there such a thing as online privacy anymore?The recent evidence might suggest that there's not: AT&T's 3G network is hacked, revealing thousands of iPad owners' email addresses. The company later suffers another

Published on: August 10th, 2010 David A. Milman

Targeted hack attacks go after mid-sized firms

Stealthy, targeted attacks aren't just for defense agencies and high-tech giants like Google, according to researchers from managed security services firm TrustWave's Spider Labs research group. In a talk at the annual Black

Published on: August 3rd, 2010 InfoWorld Staff

Apple Safari will ‘fall first’ in hacking contest

Apple's Safari will be the first browser to fall next month at the Pwn2Own hacking challenge, the contest organizer predicted today.A researcher who has won at Pwn2Own the last two years wasn't so

Published on: February 18th, 2010 Gregg Keizer

Hackers can use electrical outlets to steal computer data

If attackers intent on data theft can tap into an electrical socket near a computer or if they can draw a bead on the machine with a laser, they can steal whatever is

Published on: July 13th, 2009 Tim Greene

Black Hat – Web 2.0, DNS flaws exposed

The size and scope of security problems is growing to be so large that security experts are having more difficulty than ever protecting end users from emerging threats. That was evident in the

Published on: August 8th, 2008 Andrew Brandt