He became interested in computer security in particular during his undergraduate studies, and was then drawn to the specialised field of privacy.
Miller's experience, described in a paper he presented to the Workshop on the Economics of Information Security at Carnegie Mellon last June, highlights a growing problem in computer security.
She has been even fiercer when it comes to fighting hackers throughout 25 years in the computer security industry.
FORBES: Asia's Women In the Mix: Eva Chen Battles the Hackers
"If you look at what's happening now in the computer security field, the bad guys are winning, and they're just criminals, " says Schneier.
Granick, who was also Civil Liberties Director at the Electronic Frontier Foundation before joining her new firm, says she has always given advice to people in the computer security field.
In Europe, the computer security company Sophos reported the worm hit all 19 of Britain's Coastguard control centers.
D. from Stanford in quantitative modeling of computer security and B.
Computer security experts believe the virus will be under control by Monday, but ILOVEYOU has already caused more damage than last year's Melissa virus, which spurred many companies to invest in costly and complex computer security measures.
McAfee founded his namesake computer security software in 1987, running it initially out of his home in California.
McAfee founded his namesake computer security software in 1987, initially running it out of his home in California.
Last year , at the Black Hat security conference in Las Vegas, computer scientist Andrei Costin discussed weaknesses he said he found in a new U.S. air-traffic security system set to roll out next year.
Richard Bejtlich, chief security officer at Mandiant, a computer-security company, said that in cases handled by his firm where intrusions were traced back to Chinese hackers, 94% of the targeted companies didn't realize they had been breached until someone else told them.
And in the meantime he's been spending his days on a hobby that periodically stuns the computer security world: seeking out cracks in the source code of Apple's iPhone, a device with more software restrictions than practically any computer on the market, and utterly obliterating its defenses against hackers.
In a Thursday afternoon presentation titled "Hacking Capitalism" at the Black Hat conference, a gathering of computer security experts, they detailed weaknesses in applications using Financial Information eXchange Protocol, or FIX, a common language used in communications between banks and commercial markets.
In America, a congressional committee for computer security has given failing grades to many of the federal bodies it scrutinises.
These products are used in telecommunications networks, computer-controlled systems, security systems, emergency lighting, electric utilities and switchgear, medical equipment, rail signaling, renewable energy, and military and aviation equipment.
"I trust (Attorney General Janet) Reno, but I don't know the intent of her successors, " said Jeffrey Schiller, an MIT computer security expert contacted to participate in the review.
CNN: Justice Department mum about who will review 'Carnivore'
The agency plans to hold public hearings across the U.S. in the next two months on privacy and computer security issues before officials make a final decision on the fate of the Web site, Callahan said.
We committed to partner on practical workshops for senior experts in law enforcement, IT and other fields to address national cyber strategies, domestic and regional coordination, public-private partnerships in cyber security and the development of national Computer Emergency Readiness Teams (CERTS).
WHITEHOUSE: Joint Statement of the 4th ASEAN-U.S. Leaders' Meeting
The virus was discovered by a Russian security firm that specialises in targeting malicious computer code.
FORBES: The Real Flame Wars: W32.Flamer Found All Over the Middle East
Marry HP and Compaq, and you have a potential T. rex in the food chain of computer imaging, printing, security and storage.
The fact that ILOVEYOU was seemingly unaffected by most companies' front-line defenses should serve as a wake-up call to businesses that in the ever-mutating world of computer viruses, security software must constantly be updated with the latest technology.
In front of each computer in the Emergency Operations Center is a placard: Ethics, Immunization, Mental Health, Security, and dozens more.
In an era of interactive television cables, the growth of computer checking and check-out counters, of security systems and telephones, all lodged together in computers, it would be relatively easy at some point to give a profile of a person and tell what they buy in a store, what kind of food they like, what sort of television programs they watch.
FORBES: Court Case Spells Trouble for Frictionless Sharing of Videos on Facebook
The program researched vulnerabilities in computer networks running critical infrastructure and sought ways to close security holes.
The team plans to demonstrate its findings at the Black Hat computer security conference, which begins July 27 in Las Vegas.
Documents seized in 2007 by the police show the security on his computer had been compromised, but the Metropolitan Police did not tell M Hurst until October 2011.
Most computer-security professionals don't believe in security.
Such madness creates job security for Nelson Mattos, a computer scientist in charge of IBM's information integration effort.
应用推荐