^
+ Follow COMPUTER EMERGENCY READINESS TEAM Tag
Array
(
    [results] => Array
        (
            [0] => Array
                (
                    [ArticleID] => 458533
                    [Title] => US looks to hackers to protect cyber networks
                    [Summary] => 

WASHINGTON (AP) - Wanted: Computer hackers.

[DatePublished] => 2009-04-18 19:03:19 [ColumnID] => 133272 [Focus] => 0 [AuthorID] => [AuthorName] => [SectionName] => [SectionUrl] => [URL] => ) [1] => Array ( [ArticleID] => 309195 [Title] => Hackers targeting security programs, says report [Summary] => WASHINGTON – Hackers’ attacks on computer networks are evolving, zeroing in on flaws in some of the very software programs designed to keep data secure and prevent break-ins, according to a report by security experts who view the trend with alarm.

Among the programs targeted by hackers are those that back up – or copy – data, as well as anti-virus and firewall applications.
[DatePublished] => 2005-11-28 00:00:00 [ColumnID] => 133272 [Focus] => 0 [AuthorID] => [AuthorName] => [SectionName] => Technology [SectionUrl] => technology [URL] => ) ) )
COMPUTER EMERGENCY READINESS TEAM
Array
(
    [results] => Array
        (
            [0] => Array
                (
                    [ArticleID] => 458533
                    [Title] => US looks to hackers to protect cyber networks
                    [Summary] => 

WASHINGTON (AP) - Wanted: Computer hackers.

[DatePublished] => 2009-04-18 19:03:19 [ColumnID] => 133272 [Focus] => 0 [AuthorID] => [AuthorName] => [SectionName] => [SectionUrl] => [URL] => ) [1] => Array ( [ArticleID] => 309195 [Title] => Hackers targeting security programs, says report [Summary] => WASHINGTON – Hackers’ attacks on computer networks are evolving, zeroing in on flaws in some of the very software programs designed to keep data secure and prevent break-ins, according to a report by security experts who view the trend with alarm.

Among the programs targeted by hackers are those that back up – or copy – data, as well as anti-virus and firewall applications.
[DatePublished] => 2005-11-28 00:00:00 [ColumnID] => 133272 [Focus] => 0 [AuthorID] => [AuthorName] => [SectionName] => Technology [SectionUrl] => technology [URL] => ) ) )
abtest
Are you sure you want to log out?
X
Login

Philstar.com is one of the most vibrant, opinionated, discerning communities of readers on cyberspace. With your meaningful insights, help shape the stories that can shape the country. Sign up now!

Get Updated:

Signup for the News Round now

FORGOT PASSWORD?
SIGN IN
or sign in with