Stolen credit card numbers, hacked federal computer systems and other high-profile on-line assaults have put many users on their guard...
Late last year, Howard Schmidt, Microsoft Corp.'s director of security, quietly wrestled the software vendor's physical and IT security functions...
On Feb. 7, 2000, the first wave of distributed denial-of-service (DDOS) attacks hit Internet portal Yahoo Inc. During the next...
Yetzer-Ra, a 6-foot-3-inch, 300-pound giant of a man, paces between his "subjects" in the smoke-filled Goth club Click + Drag,...
Cobol. A simple language that's so easy to read, it's impossible to hide malicious programs. A language for mainframe data...
In December, when protesters were rampaging through Seattle in an attempt to disrupt the World Trade Organization (WYO) summit meeting,...
In police work, sometimes the longest journeys end with the shortest trips. That's what happened to Brian Koref, who spent...
In a giant leap for attack technology, crackers, possibly from Russia, are mapping the Internet.In the process, they are pinging...
"How do you spell pillage?" asked Fred Norwood, manager of information infrastructure technology at El Paso Energy Corp. in Houston.Twelve...