American democracy has been hacked.

How many of the 'Fortune' 500 are hacked? 500.

I'm a Luddite with computers, and I'm slightly worried about being hacked as well.

The Russians hacked into the Illinois State Board of Elections. They got into the database.

In the 1980s, Thatcher hacked away at our trade unions and abolished the Greater London Council.

There are two types of companies in the world: those that know they've been hacked, and those that don't.

If you spend more on coffee than on IT security, you will be hacked. What's more, you deserve to be hacked.

There are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese.

There are two types of companies: those that have been hacked, and those who don't know they have been hacked.

The 2016 election, I'm sure, wasn't the first one to be hacked; it was just the first one that was made public.

No company that I ever hacked into reported any damages, which they were required to do for significant losses.

Most devices have been hacked in some way and are part of - part of a botnet network that can come after you in DDoS attacks.

All the biggest companies are based on a founder who had a need, hacked it together, and said, 'Hey, other people might want this.'

I want a for-profit company counting my vote because they know if they get it wrong, or if they get hacked, their value will plummet.

I forged myself out of a vacuum. I crawl along the highway on hacked off stumps year after year. Some wonder how and why. I never do.

You don't want to wake up and find out that your watch was hacked, that your thermostat was hacked, that your coffeemaker was hacked.

All the time I had my success, I didn't know what I was doing. I struggled and struggled and hacked things out without any insight as to why.

I would be much less stressed out without social media. I am constantly afraid of getting hacked. It's like being afraid of stepping on glass.

There is no evidence at all that a voting booth was hacked or one person's vote in America was taken from Trump candidate to Clinton candidate.

We've already seen digital picture frames pre-loaded with viruses; I'm not eager to have my refrigerator hacked or my alarm clock turned against me.

It is a fairly open secret that almost all systems can be hacked, somehow. It is a less spoken of secret that such hacking has actually gone quite mainstream.

My phone and email have been hacked, I've been arrested by the police and followed by the pro-China people or the photographers from the pro-China newspapers.

This apology is not just to Bernie Sanders. It is to donors. It is to anyone and everyone that clearly we offended. And the e-mails that were revealed that were hacked.

There are two kinds of big companies in the United States. There are those who've been hacked by the Chinese, and those who don't know they've been hacked by the Chinese.

No company that I ever hacked into reported any damages, which they were required to do for significant losses. Sun didn't stop using Solaris and DEC didn't stop using VMS.

Linux evolved in a completely different way. From nearly the beginning, it was rather casually hacked on by huge numbers of volunteers coordinating only through the Internet.

Me and my sisters were so awful. One nanny, we loved, but we hacked her email and sent her boyfriend lots of weird messages, and we once actually locked her in the toilet, too.

I saw firsthand the devastating consequences of poaching. I saw elephants with ivory hacked from their faces and the lengths private parks go to protect their precious wildlife.

Your company is probably going to get hacked. The velocity and complexity of hacking attempts has skyrocketed, with companies routinely facing millions of knocks on the vault door.

Anyone can put up a podcast, any application can locate and download it. It's a decentralized, hacked together, open system and, as podcaster and a listener, I think it works perfectly.

The Internet opens up so many doors. It's a phenomenal tool for education but also a way for people to be scary and dangerous. We're living in a world where we can be hacked and exposed.

A lot of individuals have had their personal information compromised, and then we've seen just about every corporation in this country hacked or attempted to be hacked by foreign countries.

I have relentlessly beat the drum for Google's 'two-step' authentication systems for Gmail and other services, which radically reduce the likelihood that your account can be hacked from afar.

So Chuck and I looked at that and we hacked on em for a while, and eventually we ripped the stuff out of em and put some of it into what was then called en, which was really ed with some em features.

From an architecture perspective, Mt. Gox is not an isolated incident. We've had exchanges continually hacked after Mt. Gox. This has been an ongoing problem that has continued to plague our industry.

When hackers have access to powerful computers that use brute force hacking, they can crack almost any password; even one user with insecure access being successfully hacked can result in a major breach.

Turn on all security features like two-factor authentication. People who do that generally don't get hacked. Don't care? You will when you get hacked. Do the same for your email and other social services, too.

With respect to potential computer intrusion by hostile actors, we did not find direct evidence that Secretary Clinton's personal e-mail domain, in its various configurations since 2009, was successfully hacked.

I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.

The trouble is the field of science, medicine, universities, biotech companies - you name it - have been so splintered, layers, sub-divided, hacked that people can spend their entire career studying one tiny little cog of life.

It's true, I had hacked into a lot of companies, and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems. It was all towards becoming a better hacker.

I understand that most iPhone users want a phone that can do other nifty things, not a general purpose computer that happens to make phone calls. Strict control over apps minimizes the chances that someone will find their phone hacked or virus-laden.

I am not altogether confident of my ability to put my thoughts into words: My texts are usually better after an editor has hacked away at them, and I am used to both editing and being edited. Which is to say that I am not oversensitive in such matters.

Russia has conducted a coordinated cyberattack on state election systems and hacked critical infrastructure. They have used social media to sow chaos and discord in our society. They have beaten and harassed U.S. diplomats and violated anti-proliferation treaties.

I think a lot of stuff like people's emails getting hacked or that an email you sent is stored on a hard drive somewhere, that kind of stuff worries me a little bit. It's a weird thought that someone else could get into my information that easily. That stuff's pretty scary.

Let's say we were a peacekeeping force in some small country that most people had never heard of. And we were there to host a peaceful election, and we then found out a bunch of stuff was hacked. We probably would push to have another election to make sure that would be fair.

Our nation's vital infrastructure - such as power grids and transportation hubs - becomes more vulnerable when individual devices get hacked. Criminals and terrorists who want to infiltrate systems and disrupt sensitive networks may start their attacks through access to just one person's smartphone.

Evil comes in through the cable and through the Internet. We look forward to the advent of driverless cars. But they can be hacked. You could be riding along, and some 14-year-old in Romania takes over your car, so you end up running the lights and losing your brakes or, worse, listening to Eminem. What's the purpose?

Last Friday night, I Twitted a photograph of myself that I intended to send as a direct message as part of a joke to a woman in Seattle. Once I realized I posted to Twitter I panicked, I took it down and said that I had been hacked. I then continued with that story, to stick to that story which was a hugely regrettable mistake.

The Kremlin hacked our presidential election, is waging a cyberwar against our NATO allies, and is probing opportunities to use similar tactics against democracies worldwide. Why, then, are federal agencies, local and state governments, and millions of Americans unwittingly inviting this threat into their cyber networks and secure spaces?

Share This Page