Search Details

Word: hackers (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...already been made into a movie in Sweden, but it is almost certainly going to be remade in English by Americans. There's already a producer attached, (Scott Rudin), a director being discussed (David Fincher) and rumors circulating about who might play the female lead, Lisbeth Salander - a tattooed hacker with major issues and loads of unusual sex appeal. Will the part of the reed-thin computer genius go to Natalie Portman? Maybe Kiera Knightley? Kristen Stewart? (See photos of great buddy-cop pairings in history...

Author: /time Magazine | Title: The Girl With The Dragon Tattoo: Swedish Suspense | 3/19/2010 | See Source »

...Tough luck. The bad guys play by different rules, and you can't do anything about it, so just go lock your doors.' Or we can tell the good guys, 'We will arm you with the same knowledge as the bad guys, because to defeat the hacker you need to be able to think like...

Author: /time Magazine | Title: To Battle Computer Hackers, the Pentagon Trains Its Own | 3/18/2010 | See Source »

After years of building firewalls and other defenses against relentless hacker attacks, the Pentagon is going over to the dark side of computer warfare. But ethically, of course. The Defense Department, like most other large organizations, has recognized that no wall is high enough to keep out skilled and determined hackers for keeps. Instead, it has decided that in order to anticipate and thwart attacks, it needs to know what the hackers know...

Author: /time Magazine | Title: To Battle Computer Hackers, the Pentagon Trains Its Own | 3/18/2010 | See Source »

...Pentagon personnel "are not learning to hack," insists Air Force Lieut. Colonel Eric Butterbaugh. While the EC-Council calls it "certified ethical hacker" training, the U.S. military also calls it "penetration testing" or "red-teaming." These are proven military techniques that have been used for decades to hone war-fighting skills. The Air Force and Navy, for example, maintain "aggressor squadrons" of F-5 and MiG warplanes to give U.S. military pilots practice against the tactics of potential foes. And the Army's National Training Center at Fort Irwin, Calif., has long boasted a highly trained "op-for" - opposition force...

Author: /time Magazine | Title: To Battle Computer Hackers, the Pentagon Trains Its Own | 3/18/2010 | See Source »

...Both Butterbaugh and Bavisi say there are no concerns that military personnel trained as hackers might go rogue. "Computer-network-defense service providers," Butterbaugh says, "are vetted and have security clearances." Not only that, notes Bavisi, but those trained as ethical hackers have to sign a legally binding pledge that they will not engage in malicious hacking. "So far," he says, "we haven't had a single case where someone became a real hacker...

Author: /time Magazine | Title: To Battle Computer Hackers, the Pentagon Trains Its Own | 3/18/2010 | See Source »

| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | Next