Facebook to kick off IPO the hacker way: reports
Facebook will go public hacker style with an all-night software bending bash to culminate with co-founder Mark Zuckerberg remotely ringing the Nasdaq opening bell on Friday, reports said.
Facebook will go public hacker style with an all-night software bending bash to culminate with co-founder Mark Zuckerberg remotely ringing the Nasdaq opening bell on Friday, reports said.
Business
May 17, 2012
0
0
The top-secret US National Security Agency is not required to reveal any deal it may have with Google to help protect against cyber attacks, an appeals court ruled Friday.
Internet
May 11, 2012
1
0
Most weekdays, Jarrad Sims and Tin Tam, a pair of college buddies, ride their bikes to a computer center and try to hack into computer security systems belonging to Boeing Co.
Internet
Apr 23, 2012
0
0
Veteran FBI cyber security expert Shawn Henry said he is fighting the enemy on a new front by joining a startup out to protect firms from online spies.
Internet
Apr 19, 2012
0
0
Theft of Internet service is on the rise, and experts say only a few of the culprits are being caught.
Telecom
Apr 10, 2012
1
0
Tokyo-based computer security firm Trend Micro on Friday said it linked a hacker in China to a "cyber espionage" campaign targeting India, Japan, and Tibetans.
Internet
Mar 30, 2012
1
0
(AP) -- Australia has banned Chinese technology giant Huawei from bidding to help build a nationwide high-speed Internet network due to concern about cyber attacks traced to China.
Internet
Mar 27, 2012
0
0
The Stuxnet computer virus sabotage of Iran's nuclear program was a "good idea" but it lent legitimacy to the use of malicious software as a weapon, according to a former CIA director.
Internet
Mar 2, 2012
1
0
(AP) -- The director of the FBI told an annual gathering of cyber-security professionals on Thursday that the agency needs the private sector to help combat what he believes is becoming the nation's No. 1 threat.
Internet
Mar 2, 2012
0
0
Signcryption is a technology that protects confidentiality and authenticity, seamlessly and simultaneously.
Computer Sciences
Jan 9, 2012
0
0