May 8, 1997 |
If the usual junk e-mail wasn't there to greet you when you turned on the computer yesterday, you might have a hacker to thank for an Internet assault that temporarily shut down Philadelphia "spammer" Cyber Promotions Inc. "It's getting a little ugly out there," Cyber Promotions president Sanford Wallace said yesterday. It took 20 hours - from 4 p.m. Tuesday to noon yesterday - and three computer security experts to get his system back to spewing its estimated 15 million to 20 million daily e-mails, Wallace said.
September 14, 2010
Evolve IP, a technology systems provider in Wayne, has completed $8.7 million in growth-capital financing, the privately owned company has announced. It did not disclose the source or sources of funding, and the company did not respond to a request for details. The funding is on top of $15.6 million in initial equity capital raised as of September 2007. Since opening in January 2008, Evolve said, it has secured more than $48 million in contracted revenue from businesses in 27 states and six countries.
March 24, 2010 |
A U.S. Senate subcommittee hearing on surveillance-law issues related to the Lower Merion School District's laptop-spying allegations will be conducted in Philadelphia's federal courthouse Monday. But no one involved in the Web-cam fracas is expected to appear. A witness list for the hearing indicates that U.S. Sen. Arlen Specter (D., Pa.), who chairs the crime and drugs subcommittee of the Senate Judiciary Committee, plans to call five national technology and law experts unaffiliated with Lower Merion schools or the family of Blake Robbins.
July 27, 1989 |
A Cornell University graduate student was indicted yesterday on a felony charge stemming from the creation of a computer "virus" that paralyzed about 6,000 military and university computers last fall. Robert T. Morris Jr. was indicted by a federal grand jury in Syracuse, N.Y., on a charge of obtaining unauthorized access to Pentagon-linked computer systems across the nation. The computer virus prevented the authorized use of those computers by universities and military bases.
June 30, 2005 |
Federal agents are in a familiar position as they probe the computer-security breach at an Arizona firm that left credit-card data for about 40 million people open to theft: Once again, they're playing catch-up. Faced with the vastness of cyberspace, the technical prowess of the thieves, and the runaway pace of technology, finding the culprits is no simple matter. "Unfortunately, the nature of cyber crime, and identity theft, is such that law enforcement will probably always be involved in a game of catch-up," said Paul Luehr, Minneapolis-based vice president for Stroz Friedberg L.L.C.
July 15, 2013
Even if the television viewers of Great Falls, Mont., were not sufficiently shocked by the revelations of The Steve Wilkos Show one afternoon last winter (topic: "Teen Cheaters Take Lie Detectors"), the emergency alert that interrupted the program may well have roused them from their recliners. Following the iconic tones of the Emergency Alert System, a voice warned: "Civil authorities in your area have reported that the bodies of the dead are rising from their graves and attacking the living.
March 13, 1996 |
A lot of people embellish their resumes when it comes to applying for a new job. Then there's John D. Catone, a former aide in the Casey administration. According to the state Ethics Commission, he took bragging to new - and illegal - heights. The commission has accused the former deputy special assistant to ex-Gov. Bob Casey of three counts of violating the state Ethics Act for touting his "access and influence" as a Casey administration official. The commission said that Catone tried to get a monthly salary from a private firm in return for using his government position to obtain contracts for the firm and that he used state equipment for personal use and performed work for the firm on state time.
May 1, 2012 |
If you use the Web, you have probably encountered an annoying invention called a CAPTCHA. They're the squished-up, stretched and squiggled, color-blotched collections of letters you often have to decipher before you can send an e-mail, post a comment, or buy a ticket. Is that an i or an l? you wonder. A zero or an O? Maybe you see three letters where it seems there should only be two. You tilt your head. You scoot your chair back and squint. You wonder if you need new glasses.
August 17, 1995 |
Paul Taylor, a 25-year-old self-taught computer whiz on probation for hacking, talks about the Hacker Ethic in the same way old men reminisce about a bygone era. "The hacker ethic was born in the early '80s," said Taylor, of Ridley. It meant that the "main reason to hack is to learn," and "when you get into a (computer or telephone) system, don't mess anything up - look around and leave, without getting caught. " Taylor says he's followed that ethic (except for the part about getting caught rerouting telephone calls)
July 12, 2005 |
Calling spyware "a global scourge that's reached epidemic proportions," a coalition of technology companies and public-interest groups is expected today to announce a set of guidelines and definitions that it hopes will aid everyone from makers of anti-spyware programs to consumers with infected computers. The Anti-Spyware Coalition's new guidelines arrive amid growing recognition of spyware, and as companies that market ad-delivery software known as adware are trying aggressively to distance themselves from the "spyware" label.