May 6, 1996 |
More than 40 percent of corporate, university and government computer sites reported at least one computer break-in within the last 12 months, a survey by the FBI and private security experts said yesterday. The attacks ranged from changing data in computer files to wholesale attempts to steal passwords or prevent legitimate users from gaining access to the systems. While more than half the organizations surveyed reported some attacks came from employees or other insiders, more than one-third said they had been attacked from the outside via the Internet.
May 8, 1997 |
If the usual junk e-mail wasn't there to greet you when you turned on the computer yesterday, you might have a hacker to thank for an Internet assault that temporarily shut down Philadelphia "spammer" Cyber Promotions Inc. "It's getting a little ugly out there," Cyber Promotions president Sanford Wallace said yesterday. It took 20 hours - from 4 p.m. Tuesday to noon yesterday - and three computer security experts to get his system back to spewing its estimated 15 million to 20 million daily e-mails, Wallace said.
September 14, 2010
Evolve IP, a technology systems provider in Wayne, has completed $8.7 million in growth-capital financing, the privately owned company has announced. It did not disclose the source or sources of funding, and the company did not respond to a request for details. The funding is on top of $15.6 million in initial equity capital raised as of September 2007. Since opening in January 2008, Evolve said, it has secured more than $48 million in contracted revenue from businesses in 27 states and six countries.
March 24, 2010 |
A U.S. Senate subcommittee hearing on surveillance-law issues related to the Lower Merion School District's laptop-spying allegations will be conducted in Philadelphia's federal courthouse Monday. But no one involved in the Web-cam fracas is expected to appear. A witness list for the hearing indicates that U.S. Sen. Arlen Specter (D., Pa.), who chairs the crime and drugs subcommittee of the Senate Judiciary Committee, plans to call five national technology and law experts unaffiliated with Lower Merion schools or the family of Blake Robbins.
July 27, 1989 |
A Cornell University graduate student was indicted yesterday on a felony charge stemming from the creation of a computer "virus" that paralyzed about 6,000 military and university computers last fall. Robert T. Morris Jr. was indicted by a federal grand jury in Syracuse, N.Y., on a charge of obtaining unauthorized access to Pentagon-linked computer systems across the nation. The computer virus prevented the authorized use of those computers by universities and military bases.
June 30, 2005 |
Federal agents are in a familiar position as they probe the computer-security breach at an Arizona firm that left credit-card data for about 40 million people open to theft: Once again, they're playing catch-up. Faced with the vastness of cyberspace, the technical prowess of the thieves, and the runaway pace of technology, finding the culprits is no simple matter. "Unfortunately, the nature of cyber crime, and identity theft, is such that law enforcement will probably always be involved in a game of catch-up," said Paul Luehr, Minneapolis-based vice president for Stroz Friedberg L.L.C.
May 1, 2012 |
If you use the Web, you have probably encountered an annoying invention called a CAPTCHA. They're the squished-up, stretched and squiggled, color-blotched collections of letters you often have to decipher before you can send an e-mail, post a comment, or buy a ticket. Is that an i or an l? you wonder. A zero or an O? Maybe you see three letters where it seems there should only be two. You tilt your head. You scoot your chair back and squint. You wonder if you need new glasses.
March 13, 1996 |
A lot of people embellish their resumes when it comes to applying for a new job. Then there's John D. Catone, a former aide in the Casey administration. According to the state Ethics Commission, he took bragging to new - and illegal - heights. The commission has accused the former deputy special assistant to ex-Gov. Bob Casey of three counts of violating the state Ethics Act for touting his "access and influence" as a Casey administration official. The commission said that Catone tried to get a monthly salary from a private firm in return for using his government position to obtain contracts for the firm and that he used state equipment for personal use and performed work for the firm on state time.
October 2, 2011
Worm The First Digital World War By Mark Bowden Atlantic Monthly. 245 pp. $25 Reviewed by Steve Weinberg When Mark Bowden writes, smart readers pay attention. A former reporter for The Inquirer, Bowden is a deserved brand name - a superb reporter and compelling narrative writer, whether his subject is war in a forlorn land ( Black Hawk Down , set in Somalia) or a variety of others in seven other books ( Killing Pablo , Guests of the Ayatollah , etc.)
August 17, 1995 |
Paul Taylor, a 25-year-old self-taught computer whiz on probation for hacking, talks about the Hacker Ethic in the same way old men reminisce about a bygone era. "The hacker ethic was born in the early '80s," said Taylor, of Ridley. It meant that the "main reason to hack is to learn," and "when you get into a (computer or telephone) system, don't mess anything up - look around and leave, without getting caught. " Taylor says he's followed that ethic (except for the part about getting caught rerouting telephone calls)