• To my surprise Google returned several results, which I clicked, and was suddenly looking at an interface that allowed the attackers to fully control a network of compromised computer system.

    FORBES: Shadows In The Cloud

  • Taking a wider approach, Intel hopes to establish a network of 100 Computer Clubhouses around the world to proliferate technology education among students between the ages of 8 and 18.

    CNN: Teen techies graduate with enhanced learning

  • Since then, Anonymous has moved away from DDoS-ing websites, which can require either mass support from thousands of individuals or the use of a botnet (a network of infected computer which can be expensive or difficult to obtain).

    FORBES: Anonymous Supporters Vow Revenge For Troy Davis

  • Yet despite their failures, the concept of network computing resonated and validated the Windows terminal, which has the advantages of a network computer and runs Windows applications.

    CNN: The future of desktop PCs

  • It sells with two-year guarantees, and offers much the biggest regional network of any Russian computer firm: 250 dealers across the country, full-service centres in 60 cities.

    ECONOMIST: Russian computers

  • It may be useful to think of a computer network as being like a system of roads.

    ECONOMIST: Companies and information

  • M. on April 19, 2011, technicians at the San Diego offices of Sony Network Entertainment noticed that four of their computer servers were rebooting without authorization.

    NEWYORKER: Machine Politics

  • To prosecutors, the 26-year-old Swartz was a thief whose aims to make information available didn't excuse the illegal acts he was charged with: breaking into a wiring closet at the Massachusetts Institute of Technology and tapping into its computer network to download millions of paid-access scholarly articles, which he planned to share publicly.

    WSJ: MIT to release documents about activist Swartz

  • Matthew Keys is charged with supplying hackers in December 2010 with the login credentials to the computer network of Tribune Co.

    WSJ: Reuters journalist charged with hacking conspiracy

  • It is easy to see why Oracle, Netscape and Sun are together promoting the Java language, since the success of the network computer would create a bigger market for all three.

    ECONOMIST: Movers and shakers

  • Hackers have repeatedly penetrated the computer network of the company that runs the Nasdaq Stock Market during the past year, and federal investigators are trying to identify the perpetrators and their purpose, according to people familiar with the matter.

    WSJ: Hackers Penetrate Nasdaq's Computers

  • Companies ranging from defense and high-tech industry leaders to Internet search leader Google have complained for years of computer network attacks that cybersecurity firms traced back to China, including allegations that some were backed or endorsed by the Beijing government.

    WSJ: US weighs tougher action over China cyberattacks

  • During the investigation, Mr. Monsegur, who lived in and worked from a public-housing project in New York City, received information on a day-to-day basis of "upwards of two dozen vulnerabilities" in computer systems from a network of cybercriminals, Mr. Pastore said in court documents released Thursday.

    WSJ: FBI's 'Sabu' Hacker Was a Model Informant

  • Now none of this might matter, if computer network decisions were still solely in the hands of the geeks in corporate IT departments.

    FORBES: Net gains

  • Instead they are created by the system's network when a specific amount of computer work, known as a "block" has been completed.

    BBC: Rewards set to halve for digital money miners

  • Colgate said the Justice Department seeks to create a permanent network of experts dedicated to preventing computer crime and prosecuting those responsible.

    CNN: Government sees cyber-attacks as disruption of commerce

  • After confirming the breach, the Chamber shut down and destroyed parts of its computer network, proceeding to revamp its security system over a 36-hour period.

    ENGADGET: Chinese hackers target U.S. Chamber of Commerce, sensitive data stolen

  • "PlayStation", and the "PS" Family logo are registered trademarks and "PS4, " "PS3, ""PSP" and the "PSVITA" logo and the PlayStation Network logo are trademarks of Sony Computer Entertainment Inc.

    ENGADGET: Sony announces more indie partnerships, Blacklight: Retribution and Primal Carnage: Genesis for PS4

  • The malware can steal data and social-network conversations, take snapshots of computer screens, penetrate across networks, turn on a computer's microphone to record audio and scan for Bluetooth-active devices.

    WSJ: Cyberattack Hits Iranian PCs

  • Thanks to the collaborative use of its computer network, it now takes only six to nine months to design and develop a new model half the time of its leading Japanese rivals.

    ECONOMIST: Wiring corporate Japan

  • Much of the campaign involved sending spear-phishing emails, where an unsuspecting target would click on a link, activating a program that would then runs quietly in the background of their computer network.

    FORBES: China Thought To Be Behind Global Cyber-Espionage Campaign That Hit UN, Olympic Committee

  • He predicts that Cisco's territory, which is the core of the computer network, will become a commodity whose value lies only in its ability to move bits as quickly as possible (although, to be fair to Cisco, it is a commodity that many firms would love to supply).

    ECONOMIST: 3Com

  • Unlike past viruses that have hijacked armies of PCs, Storm doesn't place the command and control of the network in a single computer.

    FORBES: Zombie Storm Rising

  • Once the IT infrastructure is virtualized, firms have the foundation of a shared IT infrastructure of pooled computer, network, and storage resources to delivery capacity on demand and meet fluctuations in resource requirements.

    FORBES: NetApp Was Cloud Before Cloud Was Cool, Stock Headed To $64

  • Guido, who runs his own cybersecurity firm, will walk students through one of the most common means hackers use to gain access to a computer network attacks on the software of a browser like Internet Explorer.

    WSJ: NYC students, hackers train for cybersecurity jobs

  • However, the RF is much more aggressive than the PRC in its use of non-state actors to conduct computer network attacks against internal political opponents as well as problematic states in the North Caucasus and members of the Commonwealth of Independent States such as Estonia, Georgia, Kyrgyzstan, Ukraine, and Lithuania.

    FORBES: The War That We Don't Recognize Is The War We Lose

  • However, it couldn't be determined which other parts of Nasdaq's computer network were accessed.

    WSJ: Hackers Penetrate Nasdaq's Computers

  • Google also saves searches tied to the network address of Mr. Brand's computer, which it makes anonymous after 18 months.

    WSJ: Google Agonizes on Privacy as Advertising World Vaults Ahead

  • Another person familiar with the case said the incidents were, for a computer network, the equivalent of someone sneaking into a house and walking around but apparently, so far not taking or tampering with anything.

    WSJ: Hackers Penetrate Nasdaq's Computers

  • McAfee recently announced that botnet-building malware discovered during its investigation into the Google attacks in December, 2009 and January, 2010 is not part of the alleged Chinese computer network exploitation (CNE) operation as originally believed.

    FORBES: Anti-Mining Group In Vietnam Hit With Botnet-Building Malware

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定