Gotcha!: Hack Attacks
Many of today’s computer security problems aren’t really new – just trickier, nastier and more pervasive. Problem: Forging or “spoofing” e-mail addresses, so that messages
Many of today’s computer security problems aren’t really new – just trickier, nastier and more pervasive. Problem: Forging or “spoofing” e-mail addresses, so that messages
It’s not entirely clear which virus or worm corrupted the machines used in a large-scale distributed denial-of-service attack against Akamai last June. But the attackers
At 8:29 a.m. Eastern Daylight Time on June 15, 2004, Microsoft.com, Apple.com, Google.com and Yahoo.com, along with almost 1,100 other Web sites, were chugging along
The FBI ranks espionage—including economic espionage—second only to terrorism on its list of threats to combat domestically. Where does defending against digital spies fall on
Robert McKimmeyFormer chief technology officer, Business Engine Software McKimmey pleaded guilty in July to conspiracy to commit theft and downloading trade secrets from the computer
The Data UndertakersThere’s one sure-fire way to keep information from prying eyes: Blast it into oblivion. When words and numbers outlive their usefulness to a
Four years ago, former Cisco Systems engineer Peter Morch was charged with downloading blueprints, e-mail and other property from Cisco’s servers-and taking the information to
THE OBSTACLE Half of the almost 500 corporate security professionals responding to the FBI/Computer Security Institute’s 2004 Computer Crime and Security Survey said an insider