Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy.

Can't find what you're looking for?

 

Be sure to Sign in to see all available content.

 

If you don't have an account, Register here.

Search results for: Computer-hacker

CYBER-CONFERENCE/ELECTION-HACKING
RTX3DCFI
July 28, 2017
People pull apart computers used in voting machines in a bid to uncover security bugs during a "hacker...
Las Vegas, UNITED STATES
People pull apart computers used in voting machines in a bid to uncover security bugs during a "hacker...
People pull apart computers used in voting machines in a bid to uncover security bugs during a "hacker voting village" exercise at the Def Con hacking conference in Las Vegas, Nevada, July 28, 2017. REUTERS/Jim Finkle
CYBER-ATTACK/
RTX35OSK
May 13, 2017
A hooded man holds laptop computer as cyber code is projected on him in this illustration picture taken...
Warsaw, Poland
Hooded man holds laptop computer as cyber code is projected on him in this illustration picture
A hooded man holds laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration
CYBER-ATTACK/
RTX35OSE
May 13, 2017
A hooded man holds a laptop computer as blue screen with an exclamation mark is projected on him in this...
Warsaw, Poland
Hooded man holds laptop computer as blue screen with an exclamation mark is projected on him in this...
A hooded man holds a laptop computer as blue screen with an exclamation mark is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration
CYBER-ATTACK/
RTX35OSB
May 13, 2017
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken...
Warsaw, Poland
Hooded an holds laptop computer as cyber code is projected on him in this illustration picture
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration TPX IMAGES OF THE DAY
CYBER-ATTACK/
RTX35OS3
May 13, 2017
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on...
Warsaw, Poland
Man holds laptop computer as cyber code is projected on him in this illustration picture
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration
CYBER-ATTACK/
RTX35OS1
May 13, 2017
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on...
Warsaw, Poland
Man holds laptop computer as cyber code is projected on him in this illustration picture
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration
CYBER-ATTACK/
RTX35OS0
May 13, 2017
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on...
Warsaw, Poland
Man holds laptop computer as cyber code is projected on him in this illustration picture
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration
CYBER-ATTACK/
RTX35ORW
May 13, 2017
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken...
Warsaw, Poland
Hooded man holds laptop computer as cyber code is projected on him in this illustration picture
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration
CYBER-ATTACK/
RTX35ORT
May 13, 2017
A projection of cyber code on a hooded man is pictured in this illustration picture taken on May 13,...
Warsaw, Poland
Projection of cyber code on hooded man is pictured in this illustration picture
A projection of cyber code on a hooded man is pictured in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration TPX IMAGES OF THE DAY
CYBER-ATTACK/
RTX35ORR
May 13, 2017
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken...
Warsaw, Poland
Hooded man holds a laptop computer as cyber code is projected on him in this illustration picture
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. REUTERS/Kacper Pempel/Illustration
GERMANY-CONFERENCE/
RTX2WRCL
December 28, 2016
The word "Hacklabor" (Hacker Laboratory) is seen during the 33th Chaos Communication congress, organized...
Hamburg, Germany
33th Chaos Communication congress in Hamburg
The word "Hacklabor" (Hacker Laboratory) is seen during the 33th Chaos Communication congress, organized by the Chaos Computer Club, in Hamburg, Germany December 28, 2016. REUTERS/Fabian Bimmer
USA-JUSTICE/CARLIN
RTSPQGD
September 27, 2016
FILE PHOTO: U.S. Assistant Attorney General for National Security John Carlin addresses a news conference...
Washington, UNITED STATES
U.S. Assistant Attorney General for National Security John Carlin addresses a news conference to announce...
FILE PHOTO: U.S. Assistant Attorney General for National Security John Carlin addresses a news conference to announce indictments on Iranian computer hackers, in Washington March 24, 2016. REUTERS/Jonathan Ernst/File Photo
USA-ELECTION/HACK
RTX2G8IP
June 14, 2016
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian...
Washington, UNITED STATES
The headquarters of the Democratic National Committee is seen in Washington
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to all opposition research on Republican presidential candidate Donald Trump, the committee and security researchers said on Tuesday. REUTERS/Gary Cameron
USA-ELECTION/HACK
RTX2G8IO
June 14, 2016
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian...
Washington, UNITED STATES
The headquarters of the Democratic National Committee is seen in Washington
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to all opposition research on Republican presidential candidate Donald Trump, the committee and security researchers said on Tuesday. REUTERS/Gary Cameron
USA-ELECTION/HACK
RTX2G8IN
June 14, 2016
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian...
Washington, UNITED STATES
The headquarters of the Democratic National Committee is seen in Washington
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to all opposition research on Republican presidential candidate Donald Trump, the committee and security researchers said on Tuesday. REUTERS/Gary Cameron
USA-ELECTION/HACK
RTX2G8II
June 14, 2016
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian...
Washington, UNITED STATES
The headquarters of the Democratic National Committee is seen in Washington
The headquarters of the Democratic National Committee is seen in Washington, U.S. June 14, 2016. Russian government hackers penetrated the computer network of the Democratic National Committee and gained access to all opposition research on Republican presidential candidate Donald Trump, the committee and security researchers said on Tuesday. REUTERS/Gary Cameron
ISRAEL-PALESTINIANS/CYBERCRIME
RTX29E9B
April 11, 2016
Madj Oweida, 22, (C) a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with...
Beersheba, Israel
Oweida, a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with breaking...
Madj Oweida, 22, (C) a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with breaking into Israeli military drone camera systems for Islamic militants and gleaning details of civilian aircraft movements, attends a court hearing at Beersheba district court in southern Israel, April 11, 2016. REUTERS/Amir Cohen
ISRAEL-PALESTINIANS/CYBERCRIME
RTX29E9A
April 11, 2016
Madj Oweida, 22, a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with...
Beersheba, Israel
Oweida, a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with breaking...
Madj Oweida, 22, a Palestinian computer hacker from the Gaza Strip, who was charged on March 23 with breaking into Israeli military drone camera systems for Islamic militants and gleaning details of civilian aircraft movements, attends a court hearing at Beersheba district court in southern Israel, April 11, 2016. REUTERS/Amir Cohen
USA-CRIME/
RTX21KFO
January 08, 2016
Former hedge fund manager Vitaly Korchevsky (2nd R) leaves Brooklyn Federal Court in the Brooklyn borough...
New York, UNITED STATES
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of...
Former hedge fund manager Vitaly Korchevsky (2nd R) leaves Brooklyn Federal Court in the Brooklyn borough of New York, January 8, 2016. Korchevsky, a former hedge fund manager turned pastor from Pennsylvania, is charged with other suspects for taking part in an insider trading scheme by stock traders and computer hackers in Ukraine. REUTERS/Brendan McDermid
USA-CRIME/
RTX21KFM
January 08, 2016
Former hedge fund manager Vitaly Korchevsky (L) leaves Brooklyn Federal Court in the Brooklyn borough...
New York, UNITED STATES
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of...
Former hedge fund manager Vitaly Korchevsky (L) leaves Brooklyn Federal Court in the Brooklyn borough of New York, January 8, 2016. Korchevsky, a former hedge fund manager turned pastor in Pennsylvania, is charged with other suspects for taking part in an insider trading scheme by stock traders and computer hackers in Ukraine. REUTERS/Brendan McDermid
USA-CRIME/
RTX21KFK
January 08, 2016
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of...
New York, UNITED STATES
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of...
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of New York, January 8, 2016. Korchevsky, a former hedge fund manager turned pastor from Pennsylvania, is charged with other suspects for taking part in an insider trading scheme by stock traders and computer hackers in Ukraine. REUTERS/Brendan McDermid
USA-CRIME/
RTX21KFI
January 08, 2016
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of...
New York, UNITED STATES
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of...
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of New York, January 8, 2016. Korchevsky, a former hedge fund manager turned pastor from Pennsylvania, is charged with other suspects for taking part in an insider trading scheme by stock traders and computer hackers in Ukraine. REUTERS/Brendan McDermid
USA-CRIME/
RTX21KFB
January 08, 2016
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of...
New York, UNITED STATES
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of...
Former hedge fund manager Vitaly Korchevsky leaves Brooklyn Federal Court in the Brooklyn borough of New York, January 8, 2016. Korchevsky, a former hedge fund manager turned pastor from Pennsylvania, is charged with other suspects for taking part in an insider trading scheme by stock traders and computer hackers in Ukraine. REUTERS/Brendan McDermid
MALAYSIA-ISLAMIC-STATE/
RTS4UAZ
October 17, 2015
A man types on a keyboard in front of the logo of "Kosova Hackers Security" in this photo illustration...
Sarajevo, Bosnia and Herzegovina
A man types on a keyboard in front of the logo of "Kosova Hackers Security" in this photo illustration...
A man types on a keyboard in front of the logo of "Kosova Hackers Security" in this photo illustration taken in Sarajevo, Bosnia and Herzegovina, October 16, 2015. At the request of the United States, Malaysia has arrested a man on charges of hacking personal data of more than a thousand U.S. officials and handing it to Islamic State militants in Syria so they could target the individuals. The man, 20-year-old Ardit Ferizi from Kosovo, who entered Malaysia in August 2014 to study computer science and forensics, will be extradited to the United States, police said on Thursday night. Picture taken October 16, 2015. REUTERS/Dado Ruvic
Technology
Technology
Cyber Security - 05 Jun 2015
16 PICTURES
BRAZIL-SCIENCE/
RTR4O940
February 04, 2015
A participating family stands in front of their tent in the camping area of the Campus Party event in...
Sao Paulo, Brazil
A participating family stands in front of their tent in the camping area of the Campus Party event in...
A participating family stands in front of their tent in the camping area of the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY)
BRAZIL-SCIENCE/
RTR4O93Y
February 04, 2015
Participants play in a Formula One car simulator during the Campus Party event in Sao Paulo February...
Sao Paulo, Brazil
Participants play in a Formula One car simulator during the Campus Party event in Sao Paulo
Participants play in a Formula One car simulator during the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY)
BRAZIL-SCIENCE/
RTR4O93R
February 04, 2015
A participant plays in a Formula One car simulator during the Campus Party event in Sao Paulo February...
Sao Paulo, Brazil
A participant plays in a Formula One car simulator during the Campus Party event in Sao Paulo
A participant plays in a Formula One car simulator during the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY)
BRAZIL-SCIENCE/
RTR4O93M
February 04, 2015
Participants attend the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long,...
Sao Paulo, Brazil
Participants attend the Campus Party event in Sao Paulo
Participants attend the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY)
BRAZIL-SCIENCE/
RTR4O93J
February 04, 2015
A participant walks in the camping area of the Campus Party event in Sao Paulo February 4, 2015. Campus...
Sao Paulo, Brazil
A participant walks in the camping area of the Campus Party event in Sao Paulo
A participant walks in the camping area of the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY)
BRAZIL-SCIENCE/
RTR4O939
February 04, 2015
Participants attend the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long,...
Sao Paulo, Brazil
Participants attend the Campus Party event in Sao Paulo
Participants attend the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY)
BRAZIL-SCIENCE/
RTR4O936
February 04, 2015
A participant eats food inside his tent in the camping area of the Campus Party event in Sao Paulo February...
Sao Paulo, Brazil
A participant eats food inside his tent in the camping area of the Campus Party event in Sao Paulo
A participant eats food inside his tent in the camping area of the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY)
BRAZIL-SCIENCE/
RTR4O92T
February 04, 2015
Participants work on a customised computer at Campus Party event in Sao Paulo February 4, 2015. Campus...
Sao Paulo, Brazil
Participants work on a customised computer at Campus Party event in Sao Paulo
Participants work on a customised computer at Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY)
BRAZIL-SCIENCE/
RTR4O92Q
February 04, 2015
A participant walks in the camping area of the Campus Party event in Sao Paulo February 4, 2015. Campus...
Sao Paulo, Brazil
A participant walks in the camping area of the Campus Party event in Sao Paulo
A participant walks in the camping area of the Campus Party event in Sao Paulo February 4, 2015. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8,000 hackers, developers, gamers and computer enthusiasts from around the world. REUTERS/Paulo Whitaker (BRAZIL - Tags: SCIENCE TECHNOLOGY SOCIETY)
Technology
Technology
Black Hat USA - 07 Aug 2014
20 PICTURES
CYBERSECURITY-HACKING/
RTR41I0F
August 07, 2014
People dressed as Vikings pose in front of the Norse booth during the Black Hat USA 2014 hacker conference...
Las Vegas, UNITED STATES
People dressed as Vikings pose in front of the Norse booth during the Black Hat USA 2014 hacker conference...
People dressed as Vikings pose in front of the Norse booth during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. Norse is a computer security company that provides live attack intelligence. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY BUSINESS)
News
News
Espionage Case Heightens China-Canada Tensions - 07 Aug 2014
8 PICTURES
CYBERSECURITY-HACKING/
RTR41HX1
August 06, 2014
An image of Chinese military officer Sun Kailiang is displayed as computer security expert Mikko Hypponen...
Las Vegas, UNITED STATES
An image of Chinese military officer Sun Kailiang is displayed as computer security expert Hypponen of...
An image of Chinese military officer Sun Kailiang is displayed as computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation" during a briefing at the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. Sun Kailiang is one of five Chinese military officers accused of hacking into American companies. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY CRIME LAW POLITICS BUSINESS)
CYBERSECURITY-HACKING/
RTR41HWI
August 06, 2014
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next...
Las Vegas, UNITED STATES
Computer security expert Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation"...
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation" during briefing at the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS)
CYBERSECURITY-HACKING/
RTR41HWH
August 06, 2014
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next...
Las Vegas, UNITED STATES
Computer security expert Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation"...
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation" during briefing at the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS)
CYBERSECURITY-HACKING/
RTR41HWG
August 06, 2014
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next...
Las Vegas, UNITED STATES
Computer security expert Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation"...
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation" during briefing at the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS)
CYBERSECURITY-HACKING/
RTR41HIK
August 06, 2014
Christopher Valasek (L) and Charlie Miller talk about hacking into vehicle computer systems during the...
Las Vegas, UNITED STATES
Christopher Valasek and Charlie Miller talk about hacking into vehicle computer systems during the Black...
Christopher Valasek (L) and Charlie Miller talk about hacking into vehicle computer systems during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY)
CYBERSECURITY-HACKING/
RTR41HIJ
August 06, 2014
Christopher Valasek (L) and Charlie Miller talk about hacking into vehicle computer systems during the...
Las Vegas, UNITED STATES
Christopher Valasek and Charlie Miller talk about hacking into vehicle computer systems during the Black...
Christopher Valasek (L) and Charlie Miller talk about hacking into vehicle computer systems during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY)
CYBERSECURITY-HACKERS/
RTR41DIB
August 06, 2014
Tani Currin, marketing events manager for computer security software and hardware developer Sophos, holds...
Las Vegas, UNITED STATES
Currin, marketing events manager for Sophos, holds an "anti-selfie" mask during the Black Hat USA 2014...
Tani Currin, marketing events manager for computer security software and hardware developer Sophos, holds an "anti-selfie" mask during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 5, 2014. The mask is part of a privacy awareness marketing campaign, she said. Sophos is a developer of computer security software and hardware. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY BUSINESS SOCIETY)
CANADA-CRIME/
RTR3ZVGP
July 23, 2014
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver...
Vancouver, Canada
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver...
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver July 23, 2014. The U.S. Department of Justice has charged Su, a Chinese businessman who resides in Canada, with hacking into the computer systems of Boeing and other companies in order to obtain data about military projects, according to court filings. U.S. prosecutors based in Los Angeles allege Su helped guide unidentified computer hackers in China on what technology they should procure from American company computer networks, the criminal complaint said. REUTERS/Ben Nelms (CANADA - Tags: CRIME LAW)
CANADA-CRIME/
RTR3ZVGO
July 23, 2014
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver...
Vancouver, Canada
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver...
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver July 23, 2014. The U.S. Department of Justice has charged Su, a Chinese businessman who resides in Canada, with hacking into the computer systems of Boeing and other companies in order to obtain data about military projects, according to court filings. U.S. prosecutors based in Los Angeles allege Su helped guide unidentified computer hackers in China on what technology they should procure from American company computer networks, the criminal complaint said. REUTERS/Ben Nelms (CANADA - Tags: CRIME LAW)
CANADA-CRIME/
RTR3ZVG9
July 23, 2014
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver...
Vancouver, Canada
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver...
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver July 23, 2014. The U.S. Department of Justice has charged Su, a Chinese businessman who resides in Canada, with hacking into the computer systems of Boeing and other companies in order to obtain data about military projects, according to court filings. U.S. prosecutors based in Los Angeles allege Su helped guide unidentified computer hackers in China on what technology they should procure from American company computer networks, the criminal complaint said. REUTERS/Ben Nelms (CANADA - Tags: CRIME LAW)
CANADA-CRIME/
RTR3ZVG8
July 23, 2014
Mark Jette (C), lawyer for Su Bin, stands near members of the media after Su was denied bail during a...
Vancouver, Canada
Mark Jette, lawyer for Su Bin, stands near members of the media after Su was denied bail during a hearing...
Mark Jette (C), lawyer for Su Bin, stands near members of the media after Su was denied bail during a hearing in Vancouver July 23, 2014. The U.S. Department of Justice has charged Su, a Chinese businessman who resides in Canada, with hacking into the computer systems of Boeing and other companies in order to obtain data about military projects, according to court filings. U.S. prosecutors based in Los Angeles allege Su helped guide unidentified computer hackers in China on what technology they should procure from American company computer networks, the criminal complaint said. REUTERS/Ben Nelms (CANADA - Tags: CRIME LAW MEDIA)
IRAN-HACKERS/
RTR3RE1D
May 29, 2014
A portion of the homepage of Newsonair.com is shown on a computer screen in Toronto, Ontario May 28,...
Toronto, Canada
A portion of the homepage of Newsonair.com is shown on a computer screen in Toronto
A portion of the homepage of Newsonair.com is shown on a computer screen in Toronto, Ontario May 28, 2014. In an unprecedented, three-year cyber espionage campaign, Iranian hackers created false social networking accounts and a fake news website to spy on military and political leaders in the United States, Israel and other countries, a Dallas-based cyber intelligence firm, Isight Partners, said May 29, 2014. REUTERS/Chris Helgren (CANADA - Tags: CRIME LAW POLITICS MILITARY)
TECH-CYBERSECURITY/SHIPPING
RTR3MDE8
April 23, 2014
Cargo vessels pass the waters outside Sentosa island in Singapore April 22, 2014. The next hacker playground:...
Singapore, Singapore
Cargo vessels pass the waters outside Sentosa island in Singapore
Cargo vessels pass the waters outside Sentosa island in Singapore April 22, 2014. The next hacker playground: the open seas - and the oil tankers and container vessels that ship 90 percent of the goods moved around the planet. In this internet age, as more devices are hooked up online, so they become more vulnerable to attack. As industries like maritime and energy connect ships, containers and rigs to computer networks, they expose weaknesses that hackers can exploit. Picture taken April 22, 2014. REUTERS/Edgar Su (SINGAPORE - Tags: MARITIME BUSINESS)
TECH-CYBERSECURITY/SHIPPING
RTR3MDE6
April 23, 2014
Cargo vessels pass the waters outside Sentosa island in Singapore April 22, 2014. The next hacker playground:...
Singapore, Singapore
Cargo vessels pass the waters outside Sentosa island in Singapore
Cargo vessels pass the waters outside Sentosa island in Singapore April 22, 2014. The next hacker playground: the open seas - and the oil tankers and container vessels that ship 90 percent of the goods moved around the planet. In this internet age, as more devices are hooked up online, so they become more vulnerable to attack. As industries like maritime and energy connect ships, containers and rigs to computer networks, they expose weaknesses that hackers can exploit. Picture taken April 22, 2014. REUTERS/Edgar Su (SINGAPORE - Tags: MARITIME BUSINESS)
CANADA-TAX/BUG
RTR3KLTG
April 09, 2014
The Canada Revenue Agency website is seen on a computer screen displaying information about an internet...
Toronto, Canada
The Canada Revenue Agency website is seen on a computer screen displaying information about an internet...
The Canada Revenue Agency website is seen on a computer screen displaying information about an internet security vulnerability called the "Heartbleed Bug" in Toronto, April 9, 2014. Right in the heart of tax-filing season, the Canada Revenue Agency (CRA) shut down access to online tax services on April 9, 2014 because of an Internet bug that has made data on many of the world's major websites vulnerable to theft by hackers. REUTERS/Mark Blinch (CANADA - Tags: SCIENCE TECHNOLOGY BUSINESS)
CANADA-TAX/BUG
RTR3KLT0
April 09, 2014
The Canada Revenue Agency website is seen on a computer screen displaying information about an internet...
Toronto, Canada
The Canada Revenue Agency website is seen on a computer screen displaying information about an internet...
The Canada Revenue Agency website is seen on a computer screen displaying information about an internet security vulnerability called the "Heartbleed Bug" in Toronto, April 9, 2014. Right in the heart of tax-filing season, the Canada Revenue Agency (CRA) shut down access to online tax services on April 9, 2014 because of an Internet bug that has made data on many of the world's major websites vulnerable to theft by hackers. REUTERS/Mark Blinch (CANADA - Tags: SCIENCE TECHNOLOGY BUSINESS)
KOREA/
RTR3HCJL
March 17, 2014
A student attends a white-hat hackers competition, co-hosted by the Defence Ministry and the National...
Seoul, South Korea
A student attends a white-hat hackers competition at the Korea Military Academy in Seoul
A student attends a white-hat hackers competition, co-hosted by the Defence Ministry and the National Intelligence Service, at the Korea Military Academy in Seoul September 29, 2013. Picture taken September 29, 2013. REUTERS/Lee Jae-Won (SOUTH KOREA - Tags: SCIENCE TECHNOLOGY MILITARY EDUCATION)
HEDGEFUNDS-FILINGS/
RTX18UJA
February 14, 2014
The sign outside a Target store is seen in Arvada, Colorado February 14, 2014. Carlson Capital took a...
Arvada, UNITED STATES
Sign outside a Target store is seen in Arvada
The sign outside a Target store is seen in Arvada, Colorado February 14, 2014. Carlson Capital took a new position in Target, buying 1.4 million shares only weeks before the retailer made headlines after becoming the victim of computer hackers who stole millions of credit card records. REUTERS/Rick Wilking (UNITED STATES - Tags: BUSINESS LOGO)
BRAZIL/
RTX17YI2
January 28, 2014
A man uses a racing simulator during a "Campus Party" Internet users gathering in Sao Paulo January 28,...
Sao Paulo, Brazil
Man uses a racing simulator during a "Campus Party" Internet users gathering in Sao Paulo
A man uses a racing simulator during a "Campus Party" Internet users gathering in Sao Paulo January 28, 2014. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8000 hackers, developers, gamers and computer geeks from around the world. REUTERS/Nacho Doce (BRAZIL - Tags: SCIENCE TECHNOLOGY)
BRAZIL/
RTX17YHT
January 28, 2014
A banner is seen in a "Campus Party" Internet users gathering in Sao Paulo January 28, 2014. Campus Party...
Sao Paulo, Brazil
Banner is seen in a "Campus Party" Internet users gathering in Sao Paulo
A banner is seen in a "Campus Party" Internet users gathering in Sao Paulo January 28, 2014. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8000 hackers, developers, gamers and computer geeks from around the world. The banner reads " "Watch out, Hackers thinking". REUTERS/Nacho Doce (BRAZIL - Tags: SCIENCE TECHNOLOGY)
BRAZIL/
RTX17YHR
January 28, 2014
A rag doll is seen as participants surf the web during a "Campus Party" Internet users gathering in Sao...
Sao Paulo, Brazil
Rag doll is seen as participants surf the web during a "Campus Party" Internet users gathering in Sao...
A rag doll is seen as participants surf the web during a "Campus Party" Internet users gathering in Sao Paulo January 28, 2014. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8000 hackers, developers, gamers and computer geeks from around the world. REUTERS/Nacho Doce (BRAZIL - Tags: SCIENCE TECHNOLOGY)
BRAZIL/
RTX17YHQ
January 28, 2014
A man looks at his customized computer during a "Campus Party" Internet users gathering in Sao Paulo...
Sao Paulo, Brazil
Man looks at his customized computer during a "Campus Party" Internet users gathering in Sao Paulo
A man looks at his customized computer during a "Campus Party" Internet users gathering in Sao Paulo January 28, 2014. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8000 hackers, developers, gamers and computer geeks from around the world. REUTERS/Nacho Doce (BRAZIL - Tags: SCIENCE TECHNOLOGY)
BRAZIL/
RTX17YHO
January 28, 2014
A man takes a picture of a customized computer during a "Campus Party" Internet users gathering in Sao...
Sao Paulo, Brazil
Man takes a picture of a customized computer during a "Campus Party" Internet users gathering in Sao...
A man takes a picture of a customized computer during a "Campus Party" Internet users gathering in Sao Paulo January 28, 2014. Campus Party is an annual week-long, 24-hour technology festival that gathers around 8000 hackers, developers, gamers and computer geeks from around the world. REUTERS/Nacho Doce (BRAZIL - Tags: SCIENCE TECHNOLOGY)
Sort by
Display
Items per page
Page
of 4