Credit cards for sale

Cybersecurity professional from around the world met in San Francisco this week at the RSA 2010 conference to explore some of the nefarious behind-the-scenes activity happening everyday in computers around the world.

An educational opportunity to learn from hackers and security professionals alike, at RSA, it's clear just how vulnerable the world's digital infrastructure is.

Photo by: James Martin/CNET

Howard Schmidt

U.S. Cybersecurity Coordinator Howard Schmidt announced the publication of the five-page summary of NSPD54, the secret cybersecurity directive signed by President Bush two years ago.
Photo by: James Martin/CNET


Inside the Moscone Center in San Francisco, Symantec featured an exhibit which visualized the world of criminal hacker organizations, and displayed the tools of the trade of the black-market information sharing industry.
Photo by: James Martin/CNET

The Hacking Industry

No longer do the threats arise from a few rogue hackers. Nowadays, the business of computer crime has grown into a powerful industry, with the trading of information becoming an organized, and profitable, career.
Photo by: James Martin/CNET

Hacker Marc Maiffret

Hacker Marc Maiffret, chief security architect at FireEye, helps drive technology innovation in the cause of fighting malware.
Photo by: James Martin/CNET

Janet Napolitano

Homeland Security Secretary Janet Napolitano speaks at the RSA conference on Wednesday, talking a bit about the Einstein 3 technology, which is used in efforts to thwart in-progress cyberattacks by sharing information with the National Security Agency.
Photo by: James Martin/CNET

Robert Mueller

Robert Mueller, speaking Thursday, said that criminal organizations, as well as individuals, militant groups, and foreign states, pose a growing threat to U.S. security as they target government and private computer networks.
Photo by: James Martin/CNET

Stuart McClure

Stuart McClure, general manager and senior vice president of the Risk and Compliance business unit at McAfee, on Wednesday demonstrated how someone might use Twitter as a command and control center for compromised PCs working to hack a bank account.
Photo by: James Martin/CNET

Scott Charney

Scott Charney, Microsoft's corporate vice president of Trustworthy Computing, spoke Tuesday, the same day Microsoft released its new identity management software. Charney also said that Microsoft is working on a prototype national ID card system in Germany that is designed to give consumers control over the amount of personal data they share with specific organizations.
Photo by: James Martin/CNET


The most beautiful phone ever has one wildly annoying issue

he Samsung Galaxy S8's fast speeds and fantastic curved screen make it a top phone for 2017, but the annoying fingerprint reader could sour your experience.

Hot Products