Saturday, July 28, 2012

Google Alert - hacking

News10 new results for hacking
 
RPT-US spy chief asks hackers to help government secure Internet
Reuters
(Repeats story published July 27 for wider distribution). By Joseph Menn and Jim Finkle. LAS VEGAS, July 27 (Reuters) - The head of the U.S. government's secretive National Security Agency took the unprecedented step on Friday of asking a convention of ...
See all stories on this topic »
Hacker delves into secret world of warranties
CNET
LAS VEGAS -- A young hacker here at Defcon 20 has pulled back the dense curtain of text and ambiguity surrounding warranties to show consumers how they can hack the warranty system -- and to tell companies how to improve their warranty management.
See all stories on this topic »
Should Companies Hire Criminal Hackers?
PCWorld
The rationale for hiring criminal hackers is based on the thinking that "It takes a thief to catch a thief." But some in the security community, including some hackers at the Black Hat conference in Las Vegas this week, say that it is no longer necessary.
See all stories on this topic »
NSA Boss Asks Hackers for a More Secure Net
Technology Review
Alexander spoke at the annual Def Con computer hacking conference in Las Vegas. It was a symbolic appearance that he said was motivated by a need to interest the hacker community in helping to make the Internet more secure. Alexander, who is also ...
See all stories on this topic »
NSA chief: Internet 'at great risk,' needs defense system
msnbc.com
General Keith Alexander, head of the National Security Agency, addressed an audience at the Defcon hacking conference in Las Vegas Friday, saying the Internet needed fundamental defenses against foreign incursion. It's the first time an NSA official has ...
See all stories on this topic »
Hacker Shows Air Traffic Control Danger With 'Ghost Planes'
Huffington Post
Andrei Costin, a Cypriad hacker, gave an unnerving demonstration outlining the weaknesses of air traffic control systems today at the Black Hat hacking conference in Las Vegas. Costin showed he could use just $2000 worth of store-bought electronics to ...
See all stories on this topic »
Hackers targeting small, mid-sized businesses
Dayton Daily News
Small and mid-sized businesses have become easy targets for hackers, according to local information security experts, and a new report indicates that data breaches are on the rise at smaller organizations. Virtually all companies doing business online are ...
See all stories on this topic »
Spy master courts top US hackers
ABC Online
In a speech to the gathering, he stressed common ground between US officials and hackers, telling them privacy must be preserved and that they could help by developing new tools. "I am absolutely impressed with some of the stuff going on here," he said.
See all stories on this topic »
Column: White-hat wardrobe hacking
Farmington Independent
During the computer security unit, one of the topics I cover is hackers. Surprisingly, there are two kinds of hackers out there, "black hat" hackers and "white hat" hackers. Black hat hackers are the bad guys we always hear about on the news, unleashing viruses ...
See all stories on this topic »
US spy chief asks hackers to help government secure Internet
Stabroek News
LAS VEGAS, (Reuters) - The head of the U.S. government's secretive National Security Agency took the unprecedented step yesterday of asking a convention of unruly hackers to join him in an effort to make the Internet more secure. In a speech to the 20th ...
See all stories on this topic »

Blogs2 new results for hacking
 
Hacking the Olympics Opening Ceremony
By Lance Ulanoff
Watch the Opening Ceremony live -- even in the US.
Mashable!
Hacking Wagner: the video, at last
By Norman Lebrecht
Hacking Wagner: the video, at last. July 27, 2012 By Norman Lebrecht Leave a Comment. Israeli choreographer Saar Magal has been working on a Munich show that counterpoints her country's tacit ban on playing Wagner with Bayreuth's ...
Slipped Disc

Web1 new result for hacking
 
Power strip or network hacking tool? It's both, actually | Ars Technica
Eight power outlets—and everything you need to penetrate a network.
arstechnica.com/.../power-strip-or-network-hacking-tool-its-bo...


Tip: Use a minus sign (-) in front of terms in your query that you want to exclude. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

No comments:

Post a Comment