Part 1) Research via the internet and find an article in the news regarding wireless hacking, hardware hacking, or other security breach. As security and IT change so rapidly, your article should be no older than 2007 (i.e. Less than 5 years old). Summarize the article.
Part 2) Research via the internet and find recent news article regarding denial of service attack, or distributed denial of service attack. Summarize the article.