May 6, 1996 |
More than 40 percent of corporate, university and government computer sites reported at least one computer break-in within the last 12 months, a survey by the FBI and private security experts said yesterday. The attacks ranged from changing data in computer files to wholesale attempts to steal passwords or prevent legitimate users from gaining access to the systems. While more than half the organizations surveyed reported some attacks came from employees or other insiders, more than one-third said they had been attacked from the outside via the Internet.
May 8, 1997 |
If the usual junk e-mail wasn't there to greet you when you turned on the computer yesterday, you might have a hacker to thank for an Internet assault that temporarily shut down Philadelphia "spammer" Cyber Promotions Inc. "It's getting a little ugly out there," Cyber Promotions president Sanford Wallace said yesterday. It took 20 hours - from 4 p.m. Tuesday to noon yesterday - and three computer security experts to get his system back to spewing its estimated 15 million to 20 million daily e-mails, Wallace said.
September 14, 2010
Evolve IP, a technology systems provider in Wayne, has completed $8.7 million in growth-capital financing, the privately owned company has announced. It did not disclose the source or sources of funding, and the company did not respond to a request for details. The funding is on top of $15.6 million in initial equity capital raised as of September 2007. Since opening in January 2008, Evolve said, it has secured more than $48 million in contracted revenue from businesses in 27 states and six countries.
March 24, 2010 |
A U.S. Senate subcommittee hearing on surveillance-law issues related to the Lower Merion School District's laptop-spying allegations will be conducted in Philadelphia's federal courthouse Monday. But no one involved in the Web-cam fracas is expected to appear. A witness list for the hearing indicates that U.S. Sen. Arlen Specter (D., Pa.), who chairs the crime and drugs subcommittee of the Senate Judiciary Committee, plans to call five national technology and law experts unaffiliated with Lower Merion schools or the family of Blake Robbins.
July 27, 1989 |
A Cornell University graduate student was indicted yesterday on a felony charge stemming from the creation of a computer "virus" that paralyzed about 6,000 military and university computers last fall. Robert T. Morris Jr. was indicted by a federal grand jury in Syracuse, N.Y., on a charge of obtaining unauthorized access to Pentagon-linked computer systems across the nation. The computer virus prevented the authorized use of those computers by universities and military bases.
June 30, 2005 |
Federal agents are in a familiar position as they probe the computer-security breach at an Arizona firm that left credit-card data for about 40 million people open to theft: Once again, they're playing catch-up. Faced with the vastness of cyberspace, the technical prowess of the thieves, and the runaway pace of technology, finding the culprits is no simple matter. "Unfortunately, the nature of cyber crime, and identity theft, is such that law enforcement will probably always be involved in a game of catch-up," said Paul Luehr, Minneapolis-based vice president for Stroz Friedberg L.L.C.
March 13, 1996 |
A lot of people embellish their resumes when it comes to applying for a new job. Then there's John D. Catone, a former aide in the Casey administration. According to the state Ethics Commission, he took bragging to new - and illegal - heights. The commission has accused the former deputy special assistant to ex-Gov. Bob Casey of three counts of violating the state Ethics Act for touting his "access and influence" as a Casey administration official. The commission said that Catone tried to get a monthly salary from a private firm in return for using his government position to obtain contracts for the firm and that he used state equipment for personal use and performed work for the firm on state time.
August 17, 1995 |
Paul Taylor, a 25-year-old self-taught computer whiz on probation for hacking, talks about the Hacker Ethic in the same way old men reminisce about a bygone era. "The hacker ethic was born in the early '80s," said Taylor, of Ridley. It meant that the "main reason to hack is to learn," and "when you get into a (computer or telephone) system, don't mess anything up - look around and leave, without getting caught. " Taylor says he's followed that ethic (except for the part about getting caught rerouting telephone calls)
July 12, 2005 |
Calling spyware "a global scourge that's reached epidemic proportions," a coalition of technology companies and public-interest groups is expected today to announce a set of guidelines and definitions that it hopes will aid everyone from makers of anti-spyware programs to consumers with infected computers. The Anti-Spyware Coalition's new guidelines arrive amid growing recognition of spyware, and as companies that market ad-delivery software known as adware are trying aggressively to distance themselves from the "spyware" label.
September 23, 2000
We're a bit ambivalent about the case of the New Jersey teen-ager whom the Securities and Exchange Commission characterized as a stock manipulator. This isn't because the charge isn't true. The 15-year-old did buy inexpensive stocks and then hype them relentlessly using many imaginary names on a variety of online bulletin boards and chat rooms. Because the stocks were so thinly traded, his recommendations moved the stocks, and he quickly sold them when their prices rose. He made almost $300,000, which, under the agreement reached with the SEC, he is returning with interest.