-
The final myth is the one that leads to the most pronounced false sense of security - that my make of computer or operating system is not vulnerable to security problems.
BBC: Computer security words in a Scrabble game
-
What if a computer hacker broke through your security system and stole or compromised all your customer data?
FORBES: Pre-thinking: Stretching Your Brain
-
The courts have yet to decide who is liable if a computer system with lax security is used to launch a denial-of-service attack, but a number of lawsuits are pending.
ECONOMIST: Forensic computing studies the anatomy of computer crime
-
After confirming the breach, the Chamber shut down and destroyed parts of its computer network, proceeding to revamp its security system over a 36-hour period.
ENGADGET: Chinese hackers target U.S. Chamber of Commerce, sensitive data stolen
-
The TVs are on some kind of preordained computer system, much like sprinklers in Los Angeles or garage security lights everywhere else.
NEWYORKER: Indianapolis (Highway 74)
-
It contained a malware application, which had managed to bypass existing security controls, but was not able to spread through the computer system.
BBC: Australia's central bank targeted by hackers
-
It's a little like LoJack -- the car security system that tracks down and recovers stolen vehicles -- for your computer.
CNN: Mobile PCs can be risky on the road
-
The once vaunted IRS computer system has trouble accomplishing what would seem to be the most basic of functions: reconciling Social Security numbers, W-2 forms and even the number of children in a household.
CNN: An Overtaxed IRS
-
Security expert Brian Krebs said the safest way to avoid any trouble was to remove it from a computer system.
BBC: Oracle issues patch for Java loopholes
-
Last year , at the Black Hat security conference in Las Vegas, computer scientist Andrei Costin discussed weaknesses he said he found in a new U.S. air-traffic security system set to roll out next year.
CNN: Hacker says phone app could hijack plane