• newThe Most Dangerous Celebrity On The Web Is...
    LOS ANGELES (AP) — If you're about to Google Jimmy Kimmel, beware.Computer security company McAfee says the talk show host is the most dangerous c... Read more: Dangerous Celebrity, Dangerous Celebrities, Jimmy Kimmel, Mcafee, Ciara,…
    - 9 hours ago Tuesday, September 30, 2014 -
  • newRobert Siciliano: USB Drives Have Serious Security Flaws
    That little thing that you stick in your computer to store or transfer data can also mean very bad news. Read more: Recycling, Identity Theft, Technology, Hacking, Privacy, Identity Protection, Hackers, Technology News
    - 19 hours ago Tuesday, September 30, 2014 -
  • newGuy Cimbalo: Sexism in Tech, and What One NYU Student Is Doing About It
    The Tumblr blog Hackers of NY launched in February this year and very quickly became a phenomenon, spawning spin off sites everywhere from Miami to Bangalore -- there's now a "Hackers of..." in nine countries and 13 cities. Read more: Te…
    - 20 hours ago Tuesday, September 30, 2014 -
  • newEric Holder: New Encryption Systems 'Thwarting' Child Porn, Kidnapping Investigations
    WASHINGTON -- Attorney General Eric Holder plans to slam technology companies Tuesday for launching new encryption systems that will lock out law enfo... Read more: Eric Holder, Fbi, Doj, Justice Department, Department of Justice, James…
    - 22 hours ago Tuesday, September 30, 2014 -
  • newBrian E. Finch: Watch Your (Supply) Tail
    In a report, the Senate detailed how various contractors for the U.S. military's Transportation Command (TRANSCOM) had been the subject of repeated and serious cyber intrusions in a period spanning 2012 through 2013. Read more: Cybersecu…
    - 1 day ago Tuesday, September 30, 2014 -
  • newHow To Protect Yourself From Domain Thieves
    Most of us are aware that hackers can steal our financial information. But few people realize that hackers can also go after other valuable property o... Read more: Godaddy, Domain Name Protection, Two Step Authentication, Website Protec…
    - 1 day ago Tuesday, September 30, 2014 -
  • newWhen Hackers Steal A Web Address, Few Owners Ever Get It Back
    For nearly two decades, Michael Lee owned a prized piece of Internet real estate: the website MLA.com. The three letters stood for his graphic... Read more: Small Businesses Hacked, Hackers Domain Theft, Cybersecurity, Domain Name Stole…
    - 2 days ago Monday, September 29, 2014 -
  • Apple Joins Rush To Fix Shellshock Bug Infecting The Internet
    Apple said Friday that it was fixing a security flaw in some versions of its operating system for Mac computers, joining other tech companies that are... Read more: Bash Bug, Computer Security, Shellshock, Apple Shellshock, Shellshock Bu…
    - 5 days ago Friday, September 26, 2014 -
  • New Security Bug May Be As Serious As 'Heartbleed'
    By Jim FinkleBOSTON, Sept 25 (Reuters) - Hackers have launched attacks exploiting the newly identified "Shellshock" computer bug, researchers warn... Read more: Bash Bug, Computer Security, Shellshock, Reuters, Bash, Shellshock Bug, Hea…
    - 6 days ago Thursday, September 25, 2014 -
  • Moti Rafalin: What Makes a Visionary... Visionary?
    Busy managers have a tendency to stay inside the walls of their organizations, often struggling to find the time to read industry blogs, network with peers, meet up with analysts or attend new and interesting events. Don't fall into this trap.…
    - 6 days ago Thursday, September 25, 2014 -
  • Michael Gregg: Five Ways Cyberterrorists Could Target The U.S.
    Cyberwarfare is now largely seen as an integral part of modern warfare by most developed nations. Until now, however, we have yet to see sophisticated cyber tactics be used by jihadist groups like al-Qaeda or ISIS. But that could soon change.…
    - 6 days ago Thursday, September 25, 2014 -
  • New Software Bug May Be Worse Than 'Heartbleed'
    By Jim Finkle BOSTON (Reuters) - A newly discovered security bug in a widely used piece of Linux software, known as "Bash," could pose a... Read more: Software Bug, Computer Virus, Bash Linux Hackers, Bash, Computer Virus H…
    - 7 days ago Wednesday, September 24, 2014 -
  • Home Depot Security Team Understaffed And Overwhelmed For Years, Insiders Say
    The Home Depot team tasked with protecting customer credit card data from hackers was understaffed and overwhelmed for years before the biggest securi... Read more: Home Depot Cyber Security, Bank Fraud, Credit Card Hack, Retail Industry…
    - 7 days ago Wednesday, September 24, 2014 -
  • You Can Create The Perfect Password. Here's How
    Are you one of those people who's still using "baseball" or your home address for all your passwords? We shouldn't have to tell you this, but having s... Read more: Perfect Password, Password, Cybersecurity, Password Manager, Password Hi…
    - 7 days ago Wednesday, September 24, 2014 -
  • Rebecca Abrahams: Cyber Attack: Coming to a Store Near You
    BigPill Drug stores began in 1960 and grew to 35 stores by 1990. The company had more than 100 stores in 2000. It is now a publicly traded company, w... Read more: Retail-Hackers, Data Theft, Home Depot, Hacking, Cyber Attacks, Privacy,…
    - 14 days ago Wednesday, September 17, 2014 -
  • Jeff Fox: Waiting for Data Breaches Like Home Depot & Target to Stop? Don't Hold Your Breath.
    Cybercrime is a massive multinational industry that regularly makes many attempts to breach major institutions. Why so many of those efforts have been succeeding lately, on such a large scale, is due partly to how smart an organization needs to be to…
    - 15 days ago Tuesday, September 16, 2014 -
  • Shopping Online May Actually Be Safer Than Shopping In Person
    The list of major retailers that have been hacked keeps growing. But while tens of millions of people have seen their credit card numbers fall into th... Read more: Online Shopping Safe, Online Security, Target Hacked, Home Depot Hacked,…
    - 16 days ago Monday, September 15, 2014 -
  • Adam Levin: 3 Ways Your Kids Can Get You Hacked
    Google is planning to open Gmail and YouTube to kids under the age of 13. While the company will restrict this king's ransom of new clicks to kid-friendly content, hackers could well have a field day. Read more: Malware, Phone Hacking, G…
    - 19 days ago Friday, September 12, 2014 -
  • CreditSesame.com: Hackers Bypass Home Depot Debit Card PINs
    Home Depot hasn't really told us much about their data breach so far, and for that, I say shame on them. One of the few things they did share though, and quite categorically, is that no debit card PINs were exposed in the breach. Read mo…
    - 20 days ago Thursday, September 11, 2014 -
  • Bea Edwards: A Nation of Laws?
    If you watched this drama closely, you surely noticed how narrowly we conceptualize corruption in America. In effect, general influence peddling and election purchasing, which we see more commonly, are legitimate. Read more: Nsa, Banks,…
    - 20 days ago Thursday, September 11, 2014 -
  • Rebecca Abrahams: Something's Wrong With Home Depot's Explanation of the Hack
    co-authored by Dr. Stephen Bryen, Founder & CEO ZiklagSystemsSomething is wrong with Home Depot's explanation of the hack on the point of their cas... Read more: Mobile Banking, Data Hacking, Home-Depot-Breach, Cyber Security, Credit C…
    - 21 days ago Wednesday, September 10, 2014 -
  • Greg Schwem: The Naked Truth About Jennifer Lawrence and Me
    I slowly dialed the FBI field office in Chicago and listened to the numerous voice prompts. Not sure what to press, I eventually chose '3' since I am a media representative. A female agent answered. "Who would I speak to if, uh, compromising material…
    - 21 days ago Wednesday, September 10, 2014 -
  • Home Depot Confirms Cyber Attack
    NEW YORK (AP) — Shares of home-improvement retailer Home Depot sank before the opening bell Tuesday after confirming that its payment systems had be... Read more: Home Depot Cyberattack, Home Depot Breached, Home Depot Credit Cards, Ho…
    - 23 days ago Monday, September 8, 2014 -
  • Robert Siciliano: How to Secure Your iCloud
    By now you've heard that Jennifer Lawrence's (and other celebs') cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the "Find My iPhone" app. Read more: Recyclin…
    - 23 days ago Monday, September 8, 2014 -
  • Robert Siciliano: Botnets Here, Botnets There, Botnets EVERYWHERE
    What are these "botnets" you keep hearing about? Botnets (think roBOT + NETwork--gets you "BOTNET") are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software--controlled by a solitary hacker or cybe…
    - 23 days ago Monday, September 8, 2014 -
  • newHow to Turbocharge Your iOS 8 Web-Surfing Experience
    Think iOS 8 is just an expanded version of iOS 7? Take a closer look, and you might think again. For owners of iPhone models from the 4s to the 6 Plus, Apple has introduced not only improvements to familiar features but some altogether new -- and coo…
    - 22 hours ago Tuesday, September 30, 2014 -
  • newScribbleton Has a Ton of Potential
    Scribbleton is a very infant -- as in alpha -- release of an innovative note-taking app for Linux that provides cross-platform access with Windows and Apple computers. It creates a personal wiki for storing everything from quick notes to detailed che…
    - 1 day ago Tuesday, September 30, 2014 -
  • newConsumers Fed Up With Data Breaches
    Consumers are beginning to lose their patience with the custodians of their personal information. Survey results from 2,000 consumers released last week by HyTrust, suggest that 51 percent of those polled would bolt from any business involved in a da…
    - 1 day ago Tuesday, September 30, 2014 -
  • newHow to Tap Into iOS 8's Best New Communication Features
    Apple's iOS 8 is a free upgrade for iPhone owners who have an iPhone 4s up to the new behemoth iPhone 6 Plus. iOS 8 looks a lot like iOS 7, but when you begin tapping down into it, there are dozens of new features and tweaks. Most everyone can find a…
    - 2 days ago Monday, September 29, 2014 -
  • newGNOME Again, GNOME Again, Jiggety Jig
    There's just never a dull moment here in the Linux blogosphere, and the last week or so has been a perfect illustration. Not only did the Shellshock bug hit the proverbial fan, but the ever-burning Systemd flames flared even brighter, thanks to the a…
    - 2 days ago Monday, September 29, 2014 -
  • newApple and Oracle - Are We Suckers or What?
    "There's a sucker born every minute." What's kind of funny about that famous quote is that there is no record of P.T. Barnum ever saying it, and there's a lot of evidence he was too smart to have done so. Whether Barnum made the observation or whethe…
    - 2 days ago Monday, September 29, 2014 -
  • Gadget Ogling: Smart Wine, Wooly Sound and a Clever Light Bulb
    I give LG a little flak for constantly releasing new smartphones, but here's one with a twist. LG is pegging the Wine Smart as its first flip-style smartphone. Yes, the compact style is back, only this time its fuel is Android, instead of whatever ar…
    - 4 days ago Saturday, September 27, 2014 -
  • The Power of Linux (Almost) Everywhere
    Linux -- the free open source operating system for enterprise, small business and home computing use -- is not used everywhere yet. However, its user base crosses nearly every industry. It's in consumer products like TVs and computer networking gear.…
    - 4 days ago Friday, September 26, 2014 -
  • FBI Director Comey Gives Apple and Google a Tongue-Lashing
    FBI Director James Comey on Thursday strongly criticized Apple and Google for hardening information stored in smartphones by encrypting data, making it inaccessible to law enforcement even with a court order. The FBI has had conversations with both A…
    - 5 days ago Friday, September 26, 2014 -
  • The Sky Is Droning
    The FAA on Thursday gave the green light for six aerial photo and video production companies to begin using unmanned aircraft systems, also known as "drones." To incorporate the devices in film and TV production, the companies will be required to hol…
    - 5 days ago Friday, September 26, 2014 -
  • Apple Redoubles Efforts to Fix iOS 8 Glitches
    Apple on Thursday announced it's preparing iOS 8.0.2 -- which will include a fix for problems triggered by iOS 8.0.1 -- and plans to release it in the next few days. In a rare move, Apple on Wednesday suspended downloads of iOS 8.0.1, which aimed to…
    - 6 days ago Thursday, September 25, 2014 -
  • Kali Linux "NetHunter" — Turn Your Android Device into Hacking Weapons
    The developers of one of the most advance open source operating system for penetration testing, 'KALI Linux' have announced yesterday the release of a new Kali project, known as NetHunter, that runs on a Google Nexus device.Kali Linux is an open…
    - 6 days ago Wednesday, September 24, 2014 -
  • jQuery Official Website Compromised To Serve Malware
    The official website of the popular cross-platform JavaScript library jQuery (jquery.com) has been compromised and redirecting its visitors to a third-party website hosting the RIG exploit kit, in order to distribute information-stealing malware.…
    - 6 days ago Wednesday, September 24, 2014 -
  • Yahoo Quickly Fixes SQL Injection Vulnerability Escalated to Remote Code Execution
    Yahoo! was recently impacted by a critical web application vulnerabilities which left website's database and server vulnerable to hackers. A cyber security expert and penetration tester, Ebrahim Hegazy a.k.a Zigoo from Egypt, has found a serious…
    - 7 days ago Wednesday, September 24, 2014 -
  • The Pirate Bay Runs on 21 "Raid-Proof" Virtual Machines To Avoids Detection
    The Pirate Bay is the world's largest torrent tracker site which handles requests from millions of users everyday and is in the top 100 most visited websites on the Internet. Generally, The Pirate Bay is famous for potentially hosting illegal content…
    - 8 days ago Tuesday, September 23, 2014 -
  • 'Facebook To Begin Charging Users $2.99 / Month' — Totally BULLSHIT!
    Facebook going to charge users per month?? Nobody expected such a news story this week, but it seems that Facebook will No longer be a Free Service, according to reports claimed by the National Report, "Facebook To Begin Charging Users $2.99/mo Start…
    - 8 days ago Tuesday, September 23, 2014 -
  • Limitless Keylogger Optimized with AutoIT Infected thousands of Computers
    A new surge of malware has been discovered which goes on to infect hundreds of thousands of computers worldwide and allegedly steals users’ social and banking site credentials.Few days back, a list of 5 million combinations of Gmail addresses a…
    - 8 days ago Tuesday, September 23, 2014 -
  • More Celebrity Nude Photos Leaked — Kim Kardashian and Others Targeted
    So far people have not forgotten about the recent celebrity iCloud hacking scandal, a new wave of nude photographs of celebrities have been leaked in what appears to be the second edition of the massive leak related to the celebrities intimate-images…
    - 9 days ago Monday, September 22, 2014 -
  • Next 'Android L' To Enable Full Disk Encryption By Default
    The search engine giant Google will soon come up with its next version of Android operating system, dubbed as Android L, with full-disk encryption enabled by default, Google confirmed Thursday. This will be for the first time that Google’s And…
    - 9 days ago Monday, September 22, 2014 -
  • Hacking any eBay Account in Just 1 Minute
    Four month ago, a massive data breach on the eBay website affected 145 million registered users worldwide after its database was compromised. Meanwhile, another critical vulnerability on the eBay website was reported, allowing an attacker to hijack m…
    - 9 days ago Monday, September 22, 2014 -
  • How To Run Almost Any Android App On Windows, OS X, Linux with Chrome
    From last week, Google began paving the way to run Android apps on Chrome Operating System through the project named "App Runtime for Chrome", but the release came with a lot of limitations – it only supported certain Android apps and on Chrome OS…
    - 9 days ago Monday, September 22, 2014 -
  • Malicious Google DoubleClick Advertisements Distributed Malware to Millions of Computers
    Cyber criminals have exploited the power of two online advertising networks, Google's DoubleClick and popular Zedo advertising agency, to deliver malicious advertisements to millions of internet users that could install malware on a user's computer.…
    - 10 days ago Sunday, September 21, 2014 -
  • Avira Vulnerability Puts Users' Online Backup Data At Risk
    A popular Anti-virus software Avira that provides free security software to its customers with Secure Backup service is vulnerable to a critical web application vulnerability that could allow an attacker to take over users’ account, putting million…
    - 11 days ago Saturday, September 20, 2014 -
  • How to Detect SQL Injection Attacks
    SQL Injection (SQLi) attacks have been around for over a decade. You might wonder why they are still so prevalent. The main reason is that they still work on quite a few web application targets. In fact, according to Veracode’s 2014 State of Securi…
    - 12 days ago Friday, September 19, 2014 -
  • 'The Home Depot' Data Breach Put 56 Million Payment Cards at Risk
    Home Depot, the nation’s largest home improvement retailer, announced on Thursday that a total of 56 million unique payment cards were likely compromised in a data breach at its stores, suggesting that the data breach on Home improvement chain was…
    - 12 days ago Friday, September 19, 2014 -
  • Chinese Hackers Hacked Into U.S. Defense Contractors 20 Times In Just One Year
    Chinese hackers associated with the Chinese government have successfully infiltrated the computer systems of U.S. defense contractors working with the government agency responsible for the transportation of military troops and goods across the globe,…
    - 13 days ago Thursday, September 18, 2014 -
  • Luring The Elusive Cyber Security Pro
    Struggling to find scarce IT security talent? Make sure your hiring managers understand the certifications and match candidates for skills fit -- not just credentials.
    - Monday, April 14, 2014 -
  • Amazon Plans 3D Phone: Report
    Amazon phone capable of displaying images in three dimensions could ship this fall.
    - Saturday, April 12, 2014 -
  • Google Glass Goes Public
    Google Glass Explorer Program will be open to US-based adults on tax day.
    - Saturday, April 12, 2014 -
  • Facebook Changes: What To Expect
    Facebook cracks down on spammy posts, tweaks privacy options, and revamps messaging. Here's what it means to you.
    - Saturday, April 12, 2014 -
  • Hacker Weev Free After Appeal
    Andrew "Weev" Auernheimer, who embarrassed AT&T by exposing a security flaw, had his conviction overturned by federal appeals court.
    - Friday, April 11, 2014 -
  • Rogue IT Driven By Need For Speed
    We've lost control to business users before. But this time, the thing that initiated our pain (the cloud) may also be the cure.
    - Friday, April 11, 2014 -
  • 5 Ways Android Won Me Over
    From security to "Lego" programming, Android has more going for it than you might think.
    - Friday, April 11, 2014 -
  • 5 Job Interview Tips Via Alice In Wonderland
    Curiouser and curiouser! Use these techniques during your next interview to win that IT or security job offer.
    - Thursday, April 10, 2014 -
  • Google Glass For Parkinson's: 10 Findings
    Google Glass offers more health benefits than awkwardness, Parkinson's patients in UK study find.
    - Thursday, April 10, 2014 -
  • Hackathons Should Be More Than A Circus
    Tapping into developer talent at a hackathon should be fun, but don't lose sight of the potential business benefits.
    - Thursday, April 10, 2014 -
  • 5 reasons why hackers own your organization
    Last week I noted that most companies are either already hacked or could easily be hacked -- and, when they have anything worth stealing, are probably already owned by multiple APT (advanced persistent threat) groups.
    - 15 days ago Tuesday, September 16, 2014 -
  • How network virtualization is used as a security tool
    When people think of network virtualization, the advantages that come to mind typically include faster provisioning of networks, easier management of networks and more efficient use of resources. But network virtualization can have another major bene…
    - 16 days ago Monday, September 15, 2014 -
  • Sprint, Windstream traffic routing errors hijacked other ISPs
    Internet traffic routing errors made by U.S. operators Sprint and Windstream on the same day last week underscore a long-known Internet weakness, posing both security and reliability issues. Both of the errors involved Border Gateway Protocol (BGP),…
    - 16 days ago Monday, September 15, 2014 -
  • Data protection authorities find privacy lapses in majority of mobile apps
    Many mobile apps request too many permissions and don't explain how they collect users' personal information, a study of 1,211 popular apps by the Global Privacy Enforcement Network has found. The majority of the apps reviewed did not adequately expl…
    - 19 days ago Friday, September 12, 2014 -
  • Yahoo says it faced $250,000 daily fines for defying U.S. surveillance requests
    The U.S. government once threatened to fine Yahoo $250,000 a day if it failed to assist with its surveillance efforts, Yahoo said Thursday. Yahoo said it was threatened with the fines after it challenged surveillance powers granted to the U.S. govern…
    - 19 days ago Friday, September 12, 2014 -
  • How Google's tiff with certificate authorities can impact you
    Miffed certificate authorities are calling on Google to give websites more time to upgrade the security used in browser-to-server communications before displaying warnings in Chrome. The CAs are upset over Google's roughly six-month timetable for rat…
    - 20 days ago Thursday, September 11, 2014 -
  • Enemies no more, McAfee and Symantec agree to share threat data
    The recently launched Cyber Threat Alliance has been given a big boost with the news that Intel's McAfee division and former arch-enemy Symantec are to join the industry group whose mission is to create the first significant cross-vendor movement of…
    - 20 days ago Thursday, September 11, 2014 -
  • 3 security practices IoT will disrupt
    I made it back from DEFCON with both my phone and tablet intact, but I'm happy I didn't bring a light bulb. You see, if had brought a light bulb, and that light bulb was a smart LED bulb running Linux, it might be running someone else's software by n…
    - 20 days ago Thursday, September 11, 2014 -
  • Five million Gmail addresses and passwords dumped online
    An archive containing nearly 5 million Gmail addresses and plain text passwords was posted Tuesday on an online forum, but the data is old and likely sourced from multiple data breaches according to one security firm. A user with the online alias "tv…
    - 21 days ago Wednesday, September 10, 2014 -
  • Internet Explorer steals the Patch Tuesday spotlight again
    It's hard to imagine that we are already three-fourths of the way through 2014 -- at least as measured by Microsoft Patch Tuesdays. Today, Microsoft released four new security bulletins, but only one of them is Critical. Guess which one?
    - 21 days ago Wednesday, September 10, 2014 -
  • Cloud security: We're asking the wrong questions
    In the wake of the celebrity photo breach, the media is humming with stories disparaging the safety of the cloud.
    - 21 days ago Wednesday, September 10, 2014 -
  • Adobe fixes critical flaws in Flash Player, delays Reader and Acrobat updates
    Adobe Systems released a critical security update for Flash Player that fixes 12 security vulnerabilities, but pushed back its planned patches for Reader and Acrobat by a week. The Flash Player updates, available for Windows, Mac, and Linux, address…
    - 22 days ago Tuesday, September 9, 2014 -
  • Comcast's open Wi-Fi hotspots inject ads into your browser
    Comcast is giving users a very good reason to demand an HTTPS connection on every site they visit. The Internet service provider has started injecting ads for its services on websites where you wouldn't normally see them when you're using an Xfinity…
    - 22 days ago Tuesday, September 9, 2014 -
  • Salesforce.com warns customers of malware attack
    Salesforce.com users are being targeted by a new version of a computer Trojan that has typically attacked online banking customers until now. The malware threat is called Dyre or Dyreza and came to light in June. Like most online banking Trojans, it…
    - 22 days ago Tuesday, September 9, 2014 -
  • What you need to know about the Home Depot data breach
    On Monday, Home Depot issued a public confirmation to reports that they had experienced a data breach impacting debit and credit cards. They're the world's largest home improvement retailer, operating 2,266 stores in the U.S., as well as 10 Canadian…
    - 22 days ago Tuesday, September 9, 2014 -
  • Tech industry groups ask U.S. Senate to 'swiftly pass' NSA curbs
    Tech industry organizations have written a letter to leaders in the U.S. Senate, to ask them to swiftly pass the USA Freedom Act, legislation that is expected to end the collection of bulk domestic phone data by the National Security Agency.
    - 22 days ago Tuesday, September 9, 2014 -
  • Home Depot confirms breach of its payment systems
    Home Depot said Monday that its payment systems had been breached, potentially affecting any customers who shopped at its stores in the United States and Canada since April. There's no evidence yet that debit card PIN numbers had been compromised, th…
    - 23 days ago Monday, September 8, 2014 -
  • IBM secures SoftLayer with Intel trusted modules
    Fortifying its SoftLayer cloud services for enterprise use, IBM has started using Intel's chip-based Trusted Execution Technology to help organizations in highly regulated industries meet their auditing and security compliance requirements. On Monday…
    - 23 days ago Monday, September 8, 2014 -
  • Adobe slates critical Reader security update for Tuesday
    Adobe yesterday said it would issue security updates next week for its PDF viewer Reader as well as for Acrobat, its PDF creator, to fix critical flaws in the software on Windows and Apple's OS X. But it won't be updating Flash Player, its ultra-popu…
    - 26 days ago Friday, September 5, 2014 -
  • Apple CEO says iCloud security will be strengthened
    Apple, still reeling from the nude celebrity photo incident, plans to soon strengthen security around its iCloud storage service, according to CEO Tim Cook in a news report Thursday.
    - 26 days ago Friday, September 5, 2014 -
  • newMalware program targets Hong Kong protesters using Apple devices
    A malware program that targets Hong Kong activists using Apple devices has trademarks of being developed by a nation-state, possibly China, according to a security company.Lacoon Mobile Security of San Francisco wrote on its blog on Tuesday that th…
    - 36 mins ago Wednesday, October 1, 2014 -
  • newApple publishes patch for Shellshock vulnerability
    On Monday, Apple released three patches to address vulnerabilities in GNU Bash, commonly known as Shellshock, that if exploited could allow an attacker to execute commands on the targeted host.When Shellshock was disclosed, the primary concern was th…
    - 1 day ago Monday, September 29, 2014 -
  • newSix key defenses against Shellshock attacks
    The number of attempts by hackers to compromise computers through the Shellshock vulnerability is rising, but companies have options for defending against attackers.Shellshock is the name given to a set of at least six vulnerabilities in GNU Bash, th…
    - 1 day ago Monday, September 29, 2014 -
  • newIDG Contributor Network: Number 2 on my top 10 list for security executives: Reform
    Toon Pool I recently kicked off a new series of blogs based on the top 10 threats, trends and business priorities for security executives. On September 15, I published my first blog on the subject: History's Lessons.  This second blog will look i…
    - 2 days ago Monday, September 29, 2014 -
  • newTwo scenarios that would make OS X vulnerable to the Shellshock bug
    Apple's OS X is vulnerable to the Shellshock bug, but it's not that easy for attackers to take advantage of it, according to Intego, which specializes in security software for the operating system.Shellshock is the nickname for a flaw in the Bourne…
    - 2 days ago Sunday, September 28, 2014 -
  • Shellshock Bash vulnerability being exploited in the wild, Red Hat says patch incomplete
    On Wednesday, AusCERT and MalwareMustDie reported that Shellshock is being exploited in the wild. Shellshock is the name given to a vulnerability that exists in GNU Bash versions 1.14 through 4.3.Given the reach of GNU Bash itself, combined with th…
    - 6 days ago Thursday, September 25, 2014 -
  • Virtualization, cloud complicate insider threats for federal CIOs
    Within the federal government, the shift toward virtualization and cloud computing is already well underway, but agency and industry officials warn that those migrations invite new security considerations, particularly in the form of insider threats…
    - 6 days ago Thursday, September 25, 2014 -
  • CloudFlare can provide its caching service without your SSL keys
    CloudFlare said it has engineered a novel way to handle sensitive encryption keys that allows organizations such as financial institutions to still use its caching service to fend off cyberattacks.The breakthrough, called "Keyless SSL," is a new me…
    - 12 days ago Friday, September 19, 2014 -
  • Home Depot confirms breach impacted 56 million customers
    On Thursday, Home Depot released an update on the status of their breach investigation. The update didn't include many details, but the retailer did confirm that the incident impacted 56 million customers, making their breach larger than the inciden…
    - 13 days ago Thursday, September 18, 2014 -
  • Fixing HealthCare.gov security
    While the security weaknesses found in HealthCare.gov by a U.S. government watchdog need to be addressed, they are not unusual for sites as complex as the federal insurance exchange, experts say.In a report released Tuesday, the Government Accounta…
    - 13 days ago Thursday, September 18, 2014 -
  • Hackers accessed Goodwill hosting provider for 18 months before card breach
    Hackers evaded security systems for a year-and-a-half at a hosting center that processed payment cards for Goodwill Industries, using the same type of malware that struck Target and other major retailers to steal card data, according to the charity's…
    - 14 days ago Wednesday, September 17, 2014 -
  • IDG Contributor Network: Number 1 on my top 10 list for security executives: History’s lessons
    I recently kicked off a new series of blogs based on the top 10 threats, trends and business priorities for security executives. This is part one: History's lessons.Stability is an illusionIn security, such is the universe, change is constant. If we…
    - 16 days ago Monday, September 15, 2014 -
  • How network virtualization is used as a security tool
    When people think of network virtualization, the advantages that come to mind typically include faster provisioning of networks, easier management of networks and more efficient use of resources. But network virtualization can have another major ben…
    - 16 days ago Monday, September 15, 2014 -
  • Data protection authorities find privacy lapses in majority of mobile apps
    Many mobile apps request too many permissions and don't explain how they collect users' personal information, a study of 1,211 popular apps by the Global Privacy Enforcement Network has found.The majority of the apps reviewed did not adequately exp…
    - 19 days ago Friday, September 12, 2014 -
  • Your configuration files are showing
    One of my favorite activities is using search engines to hunt for things that, realistically, I should not be able to find. Recently, I was able to find thousands of sites with their databases exposed. This time I was able to unearth a treasure trove…
    - 20 days ago Thursday, September 11, 2014 -
  • Vulnerability in popular Joomla e-commerce extension puts online shops at risk
    A critical vulnerability in a popular e-commerce extension for the Joomla content management system allows malicious users to gain super-admin privileges to sites that run the software.The VirtueMart extension, which allows users to set up online s…
    - 20 days ago Thursday, September 11, 2014 -
  • Five million Gmail addresses and passwords dumped online
    An archive containing nearly 5 million Gmail addresses and plain text passwords was posted Tuesday on an online forum, but the data is old and likely sourced from multiple data breaches according to one security firm.A user with the online alias "t…
    - 21 days ago Wednesday, September 10, 2014 -
  • Adobe fixes critical flaws in Flash Player, delays Reader and Acrobat updates
    Adobe Systems released a critical security update for Flash Player that fixes 12 security vulnerabilities, but pushed back its planned patches for Reader and Acrobat by a week.The Flash Player updates, available for Windows, Mac and Linux, address…
    - 21 days ago Wednesday, September 10, 2014 -
  • Microsoft Patch Tuesday thwarts nosey malware
    Cyberattackers curious about the contents of users' hard drives will now have a tougher time finding that information, thanks to a new patch that Microsoft issued Tuesday in the latest round of "Patch Tuesday" bug fixes.This iteration of Patch Tues…
    - 21 days ago Wednesday, September 10, 2014 -
  • Juniper expands threat intelligence for more effective network defense
    You may have heard that two heads are better than one—the basic premise being that different perspectives bring more to the table and enable the combined team to make better, more effective decisions. The same thing is true when it comes to threat…
    - 22 days ago Tuesday, September 9, 2014 -
  • newEPIC seeks enforcement action over Arizona data breaches
    A privacy watchdog filed a complaint with the Federal Trade Commission against a community college district in Arizona that lost the personal data of 2.5 million students and employees in two data breaches.
    - 1 day ago Monday, September 29, 2014 -
  • newApple patches Bash vulnerability in OS X
    Apple released a patch Monday for Shellshock, a serious software vulnerability disclosed last week, although the company had said it posed no risk to most users.
    - 1 day ago Monday, September 29, 2014 -
  • newSecond cyberattack hits SuperValu grocery stores' payment systems
    SuperValu, the grocery store operator hit by a cyberattack in June and July, has suffered a second attack on its payment processing system, it said Monday.
    - 2 days ago Monday, September 29, 2014 -
  • newCEO indicted for company's alleged mobile spyware app
    The CEO of a Pakistani company has been indicted in the U.S. for selling a product called StealthGenie that buyers could use to monitor calls, texts, videos and other communications on other people's mobile phones, the U.S. Department of Justice said…
    - 2 days ago Monday, September 29, 2014 -
  • newInternet criminals migrating to hide inside 'darknets' warns Europol
    As if tackling the malware economy wasn’t already hard enough, police forces face a massive task keeping tabs on the ‘darknet’ of anonymisation services that are being used by criminals to hide themselves, Europol’s latest Internet Organised…
    - 2 days ago Monday, September 29, 2014 -
  • newMalvertising campaign delivers digitally signed CryptoWall ransomware
    The cybercriminals behind the CryptoWall ransomware threat have stepped up their game and are digitally signing new samples before using them in attacks in an attempt to bypass antivirus detection.
    - 2 days ago Monday, September 29, 2014 -
  • newFacebook's new ad sales plan raises hackles in Germany
    As Facebook began rolling out a global advertising network on Monday that will capitalize on all it knows from tracking users across the web, German consumer organizations immediately raised their voices in protest.
    - 2 days ago Monday, September 29, 2014 -
  • newCloudFlare aims to simplify SSL encryption with free service
    More and more websites are looking to enable SSL encryption to protect their visitors from eavesdroppers and hackers. Now web infrastructure company CloudFlare will make it a bit easier by adding that feature to the free version of its hosting servic…
    - 2 days ago Monday, September 29, 2014 -
  • newImproved patch tackles new Shellshock attack vectors
    System administrators who spent last week making sure their computers are patched against Shellshock, a critical vulnerability in the Bash Unix command-line interpreter, will have to install a new patch that addresses additional attack vectors.
    - 2 days ago Monday, September 29, 2014 -
  • newTwo scenarios that would make OS X vulnerable to the Shellshock bug
    Apple's OS X is vulnerable to the Shellshock bug, but it's not that easy for attackers to take advantage of it, according to Intego, which specializes in security software for the operating system.
    - 2 days ago Sunday, September 28, 2014 -
  • Credit card breach that hit Jimmy John's is larger than originally thought
    Signature Systems says the breach of its point-of-sales system that hit 216 Jimmy John's sandwich shops is actually 50 percent larger than originally thought.
    - 5 days ago Friday, September 26, 2014 -
  • BYOD firms remotely wipe 130,000 mobile devices every year, finds Fiberlink
    Remotely wiping mobile devices is proving to be a hugely popular feature for enterprises and IBM’s Fiberlink division has some numbers to prove it. The firm's figures show that an average of 450 mobile devices are now being wiped every day by users…
    - 5 days ago Friday, September 26, 2014 -
  • National Crime Agency to feed UK banks real-time cyber-alerts
    Britain’s banks are to start using a new alerting system that will make it easier for a range of police and government agencies to warn its members of of cyberattacks and frauds in real time.
    - 5 days ago Friday, September 26, 2014 -
  • Cisco names new security chief after Young departs
    Cisco has replaces its security leadership after the departure of Senior Vice President Chris Young.
    - 5 days ago Friday, September 26, 2014 -
  • Shellshock vulnerability roils Linux server shops
    A long-standing vulnerability unearthed in the GNU Bash software, nicknamed Shellshock, has disrupted the daily activities of the Linux system administrator community, as Linux distributors, cloud vendors and end users grapple to understand the full…
    - 6 days ago Thursday, September 25, 2014 -
  • Parental Controls For YouTube
    Kids seem to be glued to YouTube these days. As a parent, it can be daunting to try and police the content that they watch. What's a parent to do?In our featured article: YouTube Parental Controls...Read Full Post
    - Saturday, May 31, 2014 -
  • Craigslist Safety and Security Tips
    Craigslist can be both a fun and scary place. You never know what you'll find for sale, and you often don't know who is on the other end of that sale until you complete the deal....Read Full Post
    - Saturday, May 31, 2014 -
  • 5 Tips to Help You Land an IT Security Job
    IT security jobs are still in high demand, especially given the fact that cyber crime seems to be a constant fixture in the news with data breaches becoming an almost daily occurrence....Read Full Post
    - Saturday, May 31, 2014 -
  • How to Avoid Becoming a Victim of the iPhone Lock Ransom Scam
    There is a new scam sweeping through Australia and other parts of the world this week. Victims are having their iPhones locked remotely by hackers who apparently compromised their iCloud account credentials. The victims are then being issued ransom d…
    - Saturday, May 31, 2014 -
  • Are Your Employees Leaking Sensitive Company Information on Facebook?
    Like it or not, Facebook is here to stay. Some companies allow employees to use Facebook at work and some strictly prohibit it. If your company allows it then you might want to continue reading....Read Full Post
    - Thursday, May 29, 2014 -
  • Rev up Your Security with a 10-minute PC Security Tune-up
    Securing your PC doesn't have to take hours and hours of your time. There are a lot of things you can do in just a few minutes to help improve your security posture....Read Full Post
    - Thursday, May 29, 2014 -
  • How to Prevent Your Web Browser From Being Hijacked
    Did you just try to Google something but instead of going to Google, your browser took you to some strange search engine you've never heard of?You might have just become a victim of browser hijacking. In this week's featured article: How to Prevent…
    - Wednesday, May 28, 2014 -
  • Are Your Clicks Getting Jacked?
    Have you ever been clickjacked? While it may sound like some kind of pro wrestling move, I assure you it is not.Clickjacking is a security threat that users all over the world are experiencing. How can you stay safe from clickjacking? Check out our…
    - Wednesday, April 30, 2014 -
  • Is Your Google+ Account Secure?
    Google+ seems to be slowly gaining some traction. It's probably not quite the big Facebook contender that Google had hoped it would be, but it is gaining steamJust like Facebook, Google+ has privacy and security settings that you should configure t…
    - Wednesday, April 30, 2014 -
  • If Your PC Was Just Hacked, Read This:
    You've just discovered that your PC has been hacked. You could run away and go hide in a corner, or you can take action and do something about it.If you opt for taking action, then you need to check out our article: I've Been Hacked! Now What? We'l…
    - Wednesday, April 30, 2014 -
  • newIntel Lures Cisco Executive Chris Young to Head Security Business
    Intel announced on Tuesday that it has hired Christopher Young as the company’s newest senior vice president and general manager of Intel Security. Young will report to Intel President Renée James and lead Intel's security business, including Mc…
    - 4 hours ago Wednesday, October 1, 2014 -
  • newMobile Identity for the Enterprise: Pitfalls and Opportunities
    What is it about the human spirit that makes us fascinated with mobility? We don’t sit still very much anymore. We travel across the globe for an important meeting, even though the technology exists to telecommute. We vacation far from home to “…
    - 5 hours ago Wednesday, October 1, 2014 -
  • newDDoS Attacks Decline in Q2: Akamai
    There may have been a decline in distributed denial-of-service attacks during the second quarter of 2014, but the private sector saw very little respite, according to a new report from Akamai Technologies. read more
    - 10 hours ago Tuesday, September 30, 2014 -
  • newHackers Arrested for Cracking US Army Network
    Hackers Charged in Software Theft from U.S. Army, Others - [UPDATE]SAN FRANCISCO - Four members of an international hacking ring were charged with cracking the networks of the US Army and developers of blockbuster war video games to steal software,…
    - 18 hours ago Tuesday, September 30, 2014 -
  • newU.S. Authorities Indict Maker of Mobile Spy App 'StealthGenie'
    The chief executive of a company that develops and sells spying software for mobile devices has been indicted in the Eastern District of Virginia in what's said to be the first-ever criminal case involving the advertisement and sale of mobile spyware…
    - 18 hours ago Tuesday, September 30, 2014 -
  • newResearchers Launch WordPress Vulnerability Database
    The team behind the open-source WordPress vulnerability scanner WPScan has launched a database containing information on numerous known security holes affecting WordPress.read more
    - 20 hours ago Tuesday, September 30, 2014 -
  • newNew Data Breaches Hit Supervalu, Albertson's
    Supermarket chains Supervalu and Albertson's revealed on Monday that some of their payment processing systems have once again been breached.read more
    - 22 hours ago Tuesday, September 30, 2014 -
  • newPalo Alto Networks Leverages Cyvera Acquisition in New Endpoint Protection Solution
    Enterprise network security firm Palo Alto Networks today announced the availability of a new security solution designed to prevent sophisticated cyber attacks targeting endpoints. read more
    - 24 hours ago Tuesday, September 30, 2014 -
  • newFBI Launches Malware Investigator Tool
    At the Virus Bulletin conference that took place in Seattle last week, the FBI introduced a tool designed to provide users with detailed technical information on malware.read more
    - 1 day ago Tuesday, September 30, 2014 -
  • newIncident Response: Focus on Big Value, Not Big Data
    In Security Operations, Less Is More. Incident Response Teams Should Focus on Data Value Instead of Data Volume.read more
    - 1 day ago Tuesday, September 30, 2014 -
  • newCheryl 'most dangerous star online'
    X Factor judge Cheryl Cole has been named as the "most dangerous celebrity" online by a security firm measuring the amount of malicious websites linked to a star's name. According to McAfee, a security technology company, 15% of the search results re…
    - 5 hours ago Wednesday, October 1, 2014 -
  • newShaw's: Hackers May Have Stolen Payment Info From Stores
    Shaw's says hackers may have stolen payment information from stores in Maine, Massachusetts, Vermont, New Hampshire, and Rhode Island. SUPERVALU, Shaw's third party IT services provider, alerted Shaw's of the latest breach occurring sometime between…
    - 8 hours ago Tuesday, September 30, 2014 -
  • newHackers admit stealing data worth millions from Army, Microsoft, more
    Microsoft's Xbox One console went on sale in China this week. Before the console's U.S. release, hackers stole specs and other information about it, a federal indictment alleges.
    - 12 hours ago Tuesday, September 30, 2014 -
  • newFeds say hackers targeted Microsoft, game makers
    Two members of an international hacking ring that gained access to a U.S. Army computer network while targeting computer giant Microsoft and several video game developers pleaded guilty to conspiracy charges Tuesday in federal court in Delaware. Davi…
    - 16 hours ago Tuesday, September 30, 2014 -
  • newFeds Say Hackers Targeted Microsoft, Game Makers
    Two men accused of being members of an international hacking ring that accessed a U.S. Army computer network and targeted computer giant Microsoft and other companies have pleaded guilty to federal conspiracy charges. Authorities say 22-year-old Davi…
    - 16 hours ago Tuesday, September 30, 2014 -
  • newSupervalu gets hacked ... again
    The company said on Monday that a hacker installed malware, in either late August or early September, into the part of its computer network that processes card purchases at some of its Shop n' Save, Shopper Food & Pharmacy and Cub Foods stores, as we…
    - 20 hours ago Tuesday, September 30, 2014 -
  • newLikes of Apple Pay May Make Smaller Banks More Vulnerable
    Many banks with less than $50 billion in assets have a problem that payment systems like Apple Pay will make even more attractive to exploit, a team of security researchers says. By altering electronic-transfer files before they are uploaded to the n…
    - 20 hours ago Tuesday, September 30, 2014 -
  • new6 Key Defenses Against Shellshock Attacks
    The number of attempts by hackers to compromise computers through the Shellshock vulnerability is rising, but companies have options for defending against attackers. Shellshock is the name given to a set of at least six vulnerabilities in GNU Bash, t…
    - 20 hours ago Tuesday, September 30, 2014 -
  • newEuropol: Greater Powers Needed to Catch Hackers
    Law enforcers in Europe need greater powers to retain data for longer in order to catch cybercriminals selling discrete services that police cannot trace under existing regulations, according to a Europol report published on Monday. Cybercrime is inc…
    - 24 hours ago Tuesday, September 30, 2014 -
  • newNew hack threatens payment cards at Albertsons
    Hackers tried to get payment card information using malware in Albertsons supermarkets and other stores, the company announced Monday. In late August or early September, the software was installed on networks that process credit and debit card transa…
    - 1 day ago Tuesday, September 30, 2014 -
  • newWhy can no one stop hackers putting celebrities' private photos online?
    Note: We do not store your email address but your IP address will be logged to prevent abuse of this feature. Please read our Legal Terms & Policies After over 100 of images of female Hollywood stars were leaked in August and again in mid-September,…
    - 1 day ago Monday, September 29, 2014 -
  • newFighting back against hackers Updated at
    Southern Oregon University Professor Lynn Ackler hates to see students swiping their debit and credit cards for small purchases around town without a second thought. "Every time I see that, I just cringe," said Ackler, who tries to use cash instead o…
    - 1 day ago Monday, September 29, 2014 -
  • newIneffective Shellshock fix means hackers are still exploiting vulnerability
    HACKERS ARE STILL mounting cyber attacks across the globe thanks to exploits of Bash bug vulnerabilities, researchers at Fireeye and Trend Micro have warned, which have been made worse by an unsuccessful patch update. The vulnerability in Unix-based…
    - 2 days ago Monday, September 29, 2014 -
  • newMalvertising campaign delivers digitally signed CryptoWall ransomware
    The cybercriminals behind the CryptoWall ransomware threat have stepped up their game and are digitally signing new samples before using them in attacks in an attempt to bypass antivirus detection. Researchers from network security firm Barracuda Net…
    - 2 days ago Monday, September 29, 2014 -
  • newCloudFlare Pushes More Encrypted Web
    Prince, chief executive of CloudFlare, a San Francisco cybersecurity and network company, is allowing customers to encrypt connections to their sites for free. Prince, 39 years old, says the offer could extend encryption to roughly two million websit…
    - 2 days ago Monday, September 29, 2014 -
  • newAnna Kendrick Cheered To Soon
    As reported on the weekend, a new wave of private celebrity photos leaked on the web. 4Chan and Reddit users call it the Flappening 3. Anna Kendrick's photos are not of nude nature.
    - 2 days ago Monday, September 29, 2014 -
  • newVoIP phone systems at risk of Shellshock Bash attacks
    The Shellshock Bash bug was found in a typical voice-over-IP phone system, opening up the possibility that many more of the business communication systems could be vulnerable if attacked. The bug uncovered this week in a widely used component of Linu…
    - 2 days ago Sunday, September 28, 2014 -
  • newApple Releases OS X bash Update 1.0
    Original release date: September 30, 2014Apple has released OS X bash Update 1.0 to address vulnerabilities found in the Bourne-again Shell (bash) which could allow a remote attacker to execute arbitrary shell commands.US-CERT recommends users and ad…
    - 11 hours ago Tuesday, September 30, 2014 -
  • Bourne-Again Shell (Bash) Remote Code Execution Vulnerability
    Original release date: September 24, 2014 | Last revised: September 30, 2014US-CERT is aware of a Bash vulnerability affecting Unix-based operating systems such as Linux and Mac OS X. Exploitation of this vulnerability may allow a remote attacker to…
    - 7 days ago Wednesday, September 24, 2014 -
  • Mozilla Network Security Services (NSS) Library Vulnerability
    Original release date: September 24, 2014A vulnerability in the Mozilla NSS library could allow an attacker to forge an RSA signature, such as an SSL certificate. The package is often included in 3rd party software, including Linux distributions, Goo…
    - 7 days ago Wednesday, September 24, 2014 -
  • Apple Releases Security Updates for iOS, Apple TV, and Xcode
    Original release date: September 18, 2014Apple released security updates for iOS devices, Apple TV, and Xcode to address multiple vulnerabilities, some of which could allow attackers to execute code with system privileges or cause an unexpected appli…
    - 13 days ago Thursday, September 18, 2014 -
  • Adobe Releases Security Updates for Adobe Reader and Acrobat
    Original release date: September 16, 2014Adobe has released security updates for Adobe Reader and Acrobat for Windows and Macintosh. Exploitation of these vulnerabilities could potentially allow an attacker to take control of the affected system.US-C…
    - 15 days ago Tuesday, September 16, 2014 -
  • Cisco Integrated Management Controller Vulnerability
    Original release date: September 11, 2014Cisco has released an advisory to address a vulnerability in the Cisco Integrated Management Controller (Cisco IMC) SSH module of the Cisco Unified Computing System E-Series Blade servers that could allow an u…
    - 20 days ago Thursday, September 11, 2014 -
  • Google Releases Security Update for Chrome
    Original release date: September 10, 2014Google has released Chrome 37.0.2062.120 for Windows, Mac and Linux. This update addresses multiple vulnerabilities one of which could potentially allow an attacker to cause a denial of service.US-CERT encoura…
    - 20 days ago Wednesday, September 10, 2014 -
  • Adobe Releases Security Updates for Flash Player and Air
    Original release date: September 09, 2014Adobe has released security updates to address multiple vulnerabilities in Adobe Flash Player and Air for Windows, Macintosh and Linux. Exploitation of these vulnerabilities could potentially allow an attacker…
    - 21 days ago Tuesday, September 9, 2014 -
  • Microsoft Releases September 2014 Security Bulletin
    Original release date: September 09, 2014Microsoft released updates to address vulnerabilities in Windows, .NET Framework, Internet Explorer and Lync Server as part of the Microsoft Security Bulletin Summary for September 2014. Some of these vulnerab…
    - 22 days ago Tuesday, September 9, 2014 -
  • WordPress Releases Security Update
    Original release date: September 04, 2014WordPress 3.9.2 has been released to address multiple vulnerabilities, one of which could allow a possible denial of service issue in PHP’s XML processing.  WordPress 3.7.3 or 3.8.3 users will be updated to…
    - 27 days ago Thursday, September 4, 2014 -
  • Дураки на экранах

    - Saturday, December 13, 2008 -
  • Казаки-разбойники

    - Wednesday, December 10, 2008 -
  • 22
    Привет.Сегодня 22.Сегодня госстат установил инфляцию на уровне почти 22%.Через 22 дня Новый Год!Конечно настроение не праздничное: кризис, р…
    - Monday, December 8, 2008 -
  • Маразм крепчал
    Привет.Государственный комитет статистики сообщил, что в октябре доходы населения сократились на 1% по сравнению с сентябрем до 77 627 млн.…
    - Friday, December 5, 2008 -
  • Защити себя сам
    Привет.Сокращения на многих промышленных предприятиях и массовое обналичивание всех вкладов привело к росту краж и грабежей.Наша добле…
    - Thursday, December 4, 2008 -
  • Спасите отечественного автопроизводителя
    Привет.Продолжаем наблюдать за кризисом. Очень интересно сравнивать действия в разных государствах.В нашей стране хотят ввести дополни…
    - Thursday, December 4, 2008 -
  • Шоу маст гоу вон
    Привет.Шоу под названием "антикризис в Украине" продолжается.Комментарии.net пишут, что министр финансов предлагает навязать всем банкам…
    - Wednesday, December 3, 2008 -
  • Вот такой у нас футбол
    Привет.Не запланированная заметка.Случайно зашел на Корреспондент.net:Вот такой у нас футбол: УЕЫИ на это все уже было 53 комментария.Посто…
    - Wednesday, December 3, 2008 -
  • Доллар гудбай...
    Привет.Наша страна (Украина) - оплот свободы и демократии.Сейчас многие говорят о конце доллара США - переход стран Северной Америки на ед…
    - Wednesday, December 3, 2008 -
  • Итоги ноября
    Привет.Давно я не проводил анализа входящего трафика. Сегодня подводим итоги ноября 2008 года. Общее число посещений 1038, посещено страниц -…
    - Tuesday, December 2, 2008 -
  • Пришла зима - пропала "зелень"
    Привет.В нашем "замечательном" государстве в течение последних нескольких лет национальная валюта была "жестко" привязана к национально…
    - Monday, December 1, 2008 -
  • А кто считает расходы на эксплуатацию?

    - Friday, November 28, 2008 -
  • Мой дом - моя крепость
    Привет.В нашем регионе кризис продолжает бушевать. Количество безработных (реальных) растет. Людей могут и не сокращать, но отправляют в…
    - Friday, November 28, 2008 -
  • И эти люди запрещают мне в носу ковыряться

    - Tuesday, November 25, 2008 -
  • Кризис не хотят замечать
    Привет.Кризис бушует. Предприятия сокращают свой штат. Многих отправляют в "бесплатные" отпуска. Многим задерживают зарплаты. Многим офи…
    - Monday, November 24, 2008 -