You searched for hackers/ | SC Media

Your search for hackers/ returned 17 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Slideshow remove

Your search for hackers/ returned 17 results

Sort Results:

Relevant Recent
Slideshow

Cars attacked by hackers

We asked our readers if they thought cars would eventually be attacked by hackers. Here are the results including additional stats.
Slideshow

June 2014 Threat Stats

This month’s threat stats look into U.S. and international hackers’ attack preferences. U.S. attackers favor the Allaple.A worm, whereas foreign hackers often harness the Zero Access trojan.
Slideshow

July 2013 Threat Stats

This month’s threat stats continue to indicate that the ZeroAccess trojan is still the malware of choice for U.S. hackers.
Slideshow

Weekend news review: December 1-5

Iranian hackers are targeting critical infrastructure and a new point-of-sale malware is being tested. For a closer look at these articles, click here to visit our news section.
Slideshow

September 2013 global threats

This month’s global threats include hackers attacking Miss Teen USA, data leaked in Belgium, and miscreants compromising the website and database of the Police Nursing College in Thailand.
Slideshow

February 2015 Threat Stats

The U.S. accounted for more than 70 percent of attack volume in November 2014. Also this month, U.S. hackers most commonly used the Upatre Downloader troajn.
Slideshow

September 2012 Threat Stats

Among other notable data, the Threat Stats from the September issue issue of SC Magazine indicate the most popular attack used by U.S. hackers is the Zero Access trojan.
Slideshow

February 2014 Global Threats

This month’s global threat map shares some of the most notable information security incidents around the world, including a hack in Bell County, Texas where hackers compromised the phone system.
Slideshow

July 2012 Threat Stats

Among other notable data, the Threat Stats from the July issue of SC Magazine indicate the most popular attacks used by U.S. hackers are web-based exploit kits.
Slideshow

A look back at notable breaches

From health care providers to grocery store chains to retailers, no business is safe from the reach of hackers. Breaches dominate general media headlines and these top incidents have impacted millions of people’s information.