Search Details

Word: computerizing (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

"I know how it feels to have privacy violated because it has happened to me and the people around me," Obama said in his announcement. Online intruders, he revealed, had penetrated his campaign's website in late 2008 and rummaged through e-mails, travel plans and other files - a "powerful...

Author: /time Magazine | Title: Cybercrime | 6/1/2009 | See Source »

...practically as long as there's been an Internet, vandals, troublemakers and criminals have sought to exploit it. Even before the advent of the personal computer, "phone phreaks" manipulated computerized phone systems to make free long-distance calls. (Reportedly among them, by many accounts: future computer pioneers Steve Wozniak and Steve Jobs, who would go on to found Apple Computer.) One infamous phreak, John Draper, became known as Captain Crunch after discovering in 1972 that he could fool AT&T's network with the tone from a plastic whistle distributed with the breakfast cereal. Computer hacker Kevin Mitnick became...

Author: /time Magazine | Title: Cybercrime | 6/1/2009 | See Source »

Cyberattacks have grown more frequent and destructive in recent years. One form of hacking - the denial-of-service (DoS) attack - has apparently even become a tool of war. The attacks are designed to paralyze websites, financial networks and other computer systems by flooding them with data from outside computers. A...

Author: /time Magazine | Title: Cybercrime | 6/1/2009 | See Source »

Government and private Web networks in the U.S. have emerged as frequent targets for online scofflaws. The Pentagon reported some 360 million attempts to break into its networks last year, up from just 6 million in 2006. That includes a reportedly successful attempt to hack into the $300 billion Joint...

Author: /time Magazine | Title: Cybercrime | 6/1/2009 | See Source »

Cyberspies are also targeting regular citizens. News headlines regularly tell of hackers ransacking computer networks for Social Security numbers, banking information and other data that could be used for potential identity theft. One recent example: officials at the University of California, Berkeley, said in May that hackers stole the Social...

Author: /time Magazine | Title: Cybercrime | 6/1/2009 | See Source »

First | Previous | 109 | 110 | 111 | 112 | 113 | 114 | 115 | 116 | 117 | 118 | 119 | 120 | 121 | 122 | 123 | 124 | 125 | 126 | 127 | 128 | 129 | Next | Last