Search for: "Kevin Hacker" Results 21 - 40 of 209
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
29 Jul 2009, 7:39 am
Security researcher Dan Kaminsky and former hacker Kevin Mitnick were targeted because of their high profiles, and because the intruders consider the two notables to be posers who hype themselves and do little to increase security, according to a note the hackers posted in a file left on Kaminsky’s site. [read post]
31 Aug 2007, 5:20 pm
TorrentSpy filed the anti-spying suit in June 2006 -- with assistance from the hacker--, accusing the MPAA of secondary liability under a federal privacy law. [read post]
22 Jul 2020, 7:27 pm by Dan Goodin
Enlarge (credit: Kevin Krejci) Hackers accessed direct messages for 36 high-profile account holders in last week’s epic compromise of Twitter, with one of the affected users being an elected official from the Netherlands, the social media company said late Wednesday. [read post]
4 Aug 2009, 6:30 am
LAS VEGAS — It’s one of the most hostile hacker environments in the country -- the DefCon hacker conference held every summer in Las Vegas. [read post]
15 Mar 2010, 4:54 pm by Colin O'Keefe
In one of many quality posts, Anthony Lake has the story of a computer hacker who gets 13 years in prison for aiding in stealing $86.4 million. [read post]
8 Mar 2016, 9:00 am
In addition to Jowers and Hacker, the Morris James attorneys who participated as coaches or judges included partners Kevin Healy, Pete Jones,  Lewis Lazarus, Dennis Schrader, Joe Slights, and David Soldo, and associates Megan Adams, Kyle Evans Gay, Nick Krawitz,  Beth Powers,  and Laura Readinger. [read post]
20 May 2011, 1:45 pm by Kim Zetter
[Disclosure: Threat Level's Kevin Poulsen and Kim Zetter were interviewed for the documentary.] [read post]
16 Jul 2017, 2:22 pm by Sabrina I. Pacifici
Spooked by surveillance and wary of being exposed by hackers, they are switching from phone calls and emails to apps that allow them to send encrypted and self-destructing texts. [read post]
29 Mar 2011, 1:17 pm by Kim Zetter
Hackers also recently struck Canadian government computers. [read post]
30 May 2011, 12:29 am by Kevin Poulsen
[Disclosure: Threat Level’s Kevin Poulsen and Kim Zetter were interviewed for the program]. [read post]
5 Oct 2022, 7:19 am by Silver Law Group
How T-Mobile Handled One SIM-Swap T-Mobile customer Kevin Miller found himself in just such a situation. [read post]
13 Jul 2016, 9:17 pm
Kevin has made a career of c.halllanging lawyers everywhere to sit down and blog... [read post]
16 Apr 2009, 11:01 pm
04/16/2009 By Kevin Poulsen A sophisticated FBI-produced spyware program has played a crucial behind-the-scenes role in federal investigations into extortion plots, terrorist threats and hacker attacks in cases stretching back at least seven years, newly declassified documents show. [read post]
8 Jan 2008, 4:59 pm
See Also: Comcast Using Malicious Hacker Technique Against Own Customers ... [read post]
8 Jan 2008, 4:01 pm
"     See Also: Comcast Using Malicious Hacker Technique Against Own Customers ... [read post]
23 Aug 2012, 5:35 pm by Jared Sulzdorf
In a story that sounds like it belongs on a Hollywood movie set, hackers reportedly breached, and subsequently password-protected and encrypted, a series of files on an Illinois medical practice’s server. [read post]