Hacker

Hacker News

  • July 24, 2015 24 Jul'15

    Alleged car hack prompts call for vehicle security act, DMCA exemption

    News roundup: A wireless car hack demonstration has pushed vehicle security legislation and DMCA exemptions into the spotlight, and prompted a manufacturer recall. Plus: Hacking Team update; DHS email issues; and smartwatches vulnerable to attack.

  • July 24, 2015 24 Jul'15

    Sony bets on Drones as a Service

    Sony is launching a new Drones as a Service business unit that uses its image sensor technology. CIOs should prepare themselves for this growing market, experts say. Also in Searchlight: Hackers disable Jeep on highway; adultery website gets hacked.

  • July 17, 2015 17 Jul'15

    DOJ takes down Darkode, but for how long?

    The U.S. Department of Justice, in coordination with 20 countries, has taken down the computer hacking forum known as Darkode, but experts say the community is already rebuilding.

  • July 16, 2015 16 Jul'15

    Flash Player security failures turn up the hate

    There have been calls for the death of the Adobe Flash Player for years either due to performance issues or the threat of exploit. But with a recent rash of zero-day vulnerabilities, those calls are getting louder.

View All News

Hacker Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Hacker Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • When it comes to healthcare big data the risk is worth it

    CIO Joel Vengco discusses how healthcare big data can improve patient care and create more vulnerabilities. In the end, he thinks it's worth it. Continue Reading

  • Will TLS 1.3 solve the problems of certificate authorities?

    Transport Layer Security (TLS) and Secure Sockets Layer (SSL) cryptographic protocols have long been the cornerstone of Web application security, and the whole process finds its root (quite literally) in a system of signed certificates. The trouble is this security system has turned into a vulnerability. Too often an enterprise possesses a hodgepodge of signed certificates from various Certificate Authorities (CAs) that are thrown into the directories of protected services, and then often forgotten until they expire. Worse yet, recently hackers have managed to create fake certificates. CAs -- once a seemingly effective answer to ensuring Web security -- are now providing an attack surface for hackers to take advantage of.

    This technical guide surveys the CA landscape, opening with a field report on the latest CA security issue, the problem of fake certificates. To help explain the nature of this threat, our second chapter delves into the certificate system, current problems with it, and what enterprise IT staff can do. This guide’s closing chapter examines industry efforts to cope with the threat: TLS 1.3. Through this guide, IT professionals, and especially those concerned with network security, will learn the latest about TLS/SSL security. Continue Reading

  • Mobile payment systems can boost data security, but are not risk free

    Infosec professionals worry that mobile payment systems will increase the risk of data breaches, but experts argue their fears are overblown. Continue Reading

View All Evaluate

Manage Hacker

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Hacker Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close