Nortel was penetrated by hackers for decade: report
Bankrupt Canadian telecom company Nortel was penetrated for at least a decade by hackers believed to have been operating from China, the Wall Street Journal reported Tuesday.
Bankrupt Canadian telecom company Nortel was penetrated for at least a decade by hackers believed to have been operating from China, the Wall Street Journal reported Tuesday.
Internet
Feb 14, 2012
9
0
Email addresses and passwords belonging to British, US and NATO officials were posted online following the hacking of a US intelligence analysis firm over Christmas, the Guardian daily reported Monday.
Internet
Jan 9, 2012
0
0
(PhysOrg.com) -- viaForensics, a computer security firm, has undertaken an exhaustive study to determine just how secure data is on smartphones; their results show that data such as login names, passwords, account numbers ...
Infamous hacker group Anonymous launched Monday its own social network after being rejected by Google's freshly-launched online community.
Internet
Jul 18, 2011
0
0
Hackers have stolen the personal data of some 1.29 million customers of the Japanese game maker Sega, the company said Sunday, in a theft via a website of its European unit.
Internet
Jun 19, 2011
5
0
Hackers have attacked Sony Ericsson's Canadian eShop website, affecting 2,000 users, the latest online strike against the Japanese electronics and entertainment giant, a Sony spokesman said Wednesday.
Internet
May 25, 2011
1
0
Sony on Tuesday said its websites in three countries had been hacked with 8,500 Greek user accounts compromised, in a blow to efforts to restore confidence after a huge data breach affecting millions.
Business
May 24, 2011
1
0
No password is 100% secure. There are always ways and means for those with malicious intent to hack, crack or socially engineer access to a password. Indeed, there are more and more websites and databases compromised on a ...
Computer Sciences
May 17, 2011
2
0
(PhysOrg.com) -- Biometric security is always a field of interest for those people who need to keep your data secure. Currently, it is used in a wide variety of high security applications, mostly by large companies with large ...
(PhysOrg.com) -- The combination of simple codes and Captchas, which are even more encrypted using a chaotic process, produces effective password protection.
Computer Sciences
Apr 19, 2011
3
0