But it disabled cash machines and disrupted commerce in this tech-savvy, Internet-dependent country, renewing questions about South Korea's Internet security and vulnerability to hackers.
Only one or two significant viruses have hit wireless PDAs and cell phones, but many industry watchers see wireless as the next big challenge for security software vendors - and hackers.
Hackers and security researchers have warned for years of vulnerabilities in next-generation air traffic control protocols.
Muller responds to that question, posed by an audience member at Black Hat's gathering of hackers and security professionals, with a smile.
That's what Dateline NBC's Associate Producer Michelle Madigan learned at this year's DefCon, the largest gathering of hackers, crackers and security professionals in the world.
Others, especially those with graduate degrees, will go on to careers in law enforcement working for the National Security Administration, the Department of Homeland Security and other federal agencies in need of hackers with special computer skills, such as advanced programming and digital forensics.
In fact, when I spoke with Richard Bejtlich, chief security officer at Mandiant and a well-known author and blogger on network security, he argued that APT1 is actually a relatively sloppy group of hackers, and that its mistakes were what part of what allowed Mandiant to profile the unit in such detail.
FORBES: The Shanghai Army Unit That Hacked 115 U.S. Targets Likely Wasn't Even China's 'A-Team'
Every few months some consulting firm trying to (literally) scare up some business will come out with a report about how Bluetooth or WiFi or some other thing is vulnerable to hackers and is a major security risk.
The increasing success of hackers means that computer and internet security is one of the few bits of the IT business showing healthy growth rates at the moment.
Yet despite companies recognizing the need for IT security professionals to combat the increased threat of hackers and external cyberattacks, they are finding a job market almost devoid of talent.
The result of moving email marketing in-house is more control of security standards, less risk of malicious targeting by hackers and access to more data for email execution.
The fact is, at this point there is little that can be done about piracy in most titles, as crackers and hackers will always find a way around security measures.
That's an artful way to say that Microsoft's security concerns were -- and are -- elsewhere: Hackers tampering with the cameras to intercept the stream to spy on users, going up the stack to the console or network.
CNN: How Microsoft learned to stop worrying and love open Kinect
Security firms are working to harden networks against hackers, and members of Congress are promoting legislation to let the government work more closely with Internet service providers without opening up the companies to lawsuits or infringing on civil liberties.
WSJ: The Weekend Interview with Timothy Thomas: Why China Is Reading Your Email
News site Gameranx was first to reveal that hackers had discovered a way to breach its security and download games free of copyright protection.
The attacks come as security experts warn of efforts by malicious hackers to target the oil and energy industry.
He conceded that the size of Microsoft's network -- and the allure to hackers of breaching Microsoft's security -- make defending its systems an ongoing challenge.
Mr O'Neill can arrange insurance against a range of risks, including data theft, virus attacks or intrusions by malicious hackers, and loss of income owing to a security breach or network failure.
South Korea has set up a team of computer security experts from the government, military and private sector to identify the hackers and is preparing to deal with more possible attacks, presidential spokesman Yoon Chang-jung told reporters Friday.
When a small team of hackers aligning themselves with Anonymous raided digital security firms HBGary Federal and HBGary Inc. last month, there followed the mother of all legal clean-up jobs.
Following a breach at RSA in March, however, the company urged clients to boost other security methods, such as passwords and PIN codes, theoretically protecting networks from hackers that may have gained the ability to duplicate those critical SecureIDs.
Malicious hackers won access despite widespread use of security tools that aim to spot and stop intrusions.
Pyra's Blogger.com suffered a security breach in October, during which unknown hackers seized control of individual user accounts and locked them out from their Blogger accounts.
Give Microsoft credit: Its first fix for a security flaw in Internet Explorer that was actively exploited by hackers may have been complex and unworkable.
Nasdaq OMX reported a security breach that took place in October last year when computer hackers penetrated its systems and may have planted some malicious software to pilfer sensitive data.
FORBES: Intelligence Agencies Interested In Nasdaq Cyber Attack
The CFAA and state computer crime laws initially were designed to restrict hackers from breaching computer security a sensible objective that, as I discuss below, should be preserved.
FORBES: The Computer Fraud and Abuse Act Is a Failed Experiment
"It comes down to what type of security a bank has in place to detect fraud and what the small business did for the hackers to be able to access its accounts, " Mr. Tubin said.
In July, General Keith Alexander, head of the NSA, said during an interview at the Aspen Security Forum in Colorado, that the number of computer attacks from hackers, criminal gangs and foreign nations on American infrastructure had increased 17-fold from 2009 to 2011.
The confirmation came after Lulz Security, a loosely aligned group of hackers, said it had carried out the attack for fun and posted files online.
Still, the shield's effectiveness as a defense in cyber-warfare is far from clear: Bruce Schneier, the founder and chief technology officer of security firm BT Counterpane, argues that no single strategy can stop determined hackers.
应用推荐