• Rebecca Abrahams: Cyber Attack: Coming to a Store Near You
    BigPill Drug stores began in 1960 and grew to 35 stores by 1990. The company had more than 100 stores in 2000. It is now a publicly traded company, w... Read more: Retail-Hackers, Data Theft, Home Depot, Hacking, Cyber Attacks, Privacy,…
    - 6 days ago Wednesday, September 17, 2014 -
  • Jeff Fox: Waiting for Data Breaches Like Home Depot & Target to Stop? Don't Hold Your Breath.
    Cybercrime is a massive multinational industry that regularly makes many attempts to breach major institutions. Why so many of those efforts have been succeeding lately, on such a large scale, is due partly to how smart an organization needs to be to…
    - 7 days ago Tuesday, September 16, 2014 -
  • Shopping Online May Actually Be Safer Than Shopping In Person
    The list of major retailers that have been hacked keeps growing. But while tens of millions of people have seen their credit card numbers fall into th... Read more: Online Shopping Safe, Online Security, Target Hacked, Home Depot Hacked,…
    - 8 days ago Monday, September 15, 2014 -
  • Adam Levin: 3 Ways Your Kids Can Get You Hacked
    Google is planning to open Gmail and YouTube to kids under the age of 13. While the company will restrict this king's ransom of new clicks to kid-friendly content, hackers could well have a field day. Read more: Malware, Phone Hacking, G…
    - 11 days ago Friday, September 12, 2014 -
  • CreditSesame.com: Hackers Bypass Home Depot Debit Card PINs
    Home Depot hasn't really told us much about their data breach so far, and for that, I say shame on them. One of the few things they did share though, and quite categorically, is that no debit card PINs were exposed in the breach. Read mo…
    - 12 days ago Thursday, September 11, 2014 -
  • Bea Edwards: A Nation of Laws?
    If you watched this drama closely, you surely noticed how narrowly we conceptualize corruption in America. In effect, general influence peddling and election purchasing, which we see more commonly, are legitimate. Read more: Nsa, Banks,…
    - 12 days ago Thursday, September 11, 2014 -
  • Rebecca Abrahams: Something's Wrong With Home Depot's Explanation of the Hack
    co-authored by Dr. Stephen Bryen, Founder & CEO ZiklagSystemsSomething is wrong with Home Depot's explanation of the hack on the point of their cas... Read more: Mobile Banking, Data Hacking, Home-Depot-Breach, Cyber Security, Credit C…
    - 13 days ago Wednesday, September 10, 2014 -
  • Greg Schwem: The Naked Truth About Jennifer Lawrence and Me
    I slowly dialed the FBI field office in Chicago and listened to the numerous voice prompts. Not sure what to press, I eventually chose '3' since I am a media representative. A female agent answered. "Who would I speak to if, uh, compromising material…
    - 13 days ago Wednesday, September 10, 2014 -
  • Home Depot Confirms Cyber Attack
    NEW YORK (AP) — Shares of home-improvement retailer Home Depot sank before the opening bell Tuesday after confirming that its payment systems had be... Read more: Home Depot Cyberattack, Home Depot Breached, Home Depot Credit Cards, Ho…
    - 15 days ago Monday, September 8, 2014 -
  • Robert Siciliano: How to Secure Your iCloud
    By now you've heard that Jennifer Lawrence's (and other celebs') cellphone nude pictures were leaked out, but how in the heck did the hacker pull this off? Tech experts believe it was through the "Find My iPhone" app. Read more: Recyclin…
    - 15 days ago Monday, September 8, 2014 -
  • Robert Siciliano: Botnets Here, Botnets There, Botnets EVERYWHERE
    What are these "botnets" you keep hearing about? Botnets (think roBOT + NETwork--gets you "BOTNET") are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software--controlled by a solitary hacker or cybe…
    - 15 days ago Monday, September 8, 2014 -
  • Robert Siciliano: 4 Identity Protection Habits Every College Student Should Have
    It's pretty easy to believe that because you are young and not in the "real world" yet that you are immune to identity theft or credit card fraud. But crime isn't so choosy about age. Read more: Recycling, Identity Theft, Technology, Hac…
    - 15 days ago Monday, September 8, 2014 -
  • Robert Siciliano: Researchers say your Mobile Carrier's Network isn't all that Secure
    Gee, even the tools that update your smartphone's operating system over the air have holes that hackers can slip into. Read more: Recycling, Identity Theft, Technology, Hacking, Privacy, Identity Protection, Hackers, Technology News…
    - 15 days ago Monday, September 8, 2014 -
  • Joe Cirincione: NATO Summit Delivers
    Obama's opponents have cynically treated these challenges as political footballs, sweeping them into their relentless narrative of a weak, vacillating and dangerous president and a feckless NATO. But NATO's leaders impressively rallied around the adm…
    - 18 days ago Friday, September 5, 2014 -
  • Rebecca Abrahams: Give Me $46 Billion and I will Build a Safe Computer System
    co-authored by Dr. Stephen Bryen, Founder & Chairman Ziklag SystemsABI Research estimates that cyber security spending on the critical infrastructur... Read more: Pentagon, National Security, Ziklag Systems, Cyber Security, Computers, H…
    - 18 days ago Friday, September 5, 2014 -
  • Adam Levin: Are Those Security Questions Begging You to Lie?
    As the smoke clears from this latest attack on privacy and our collective sense of decency, it's becoming more and more likely that a deft use of personally identifiable information was used to unlock the nude celebrity photo troves that flooded the…
    - 18 days ago Friday, September 5, 2014 -
  • Apple To Strengthen iCloud Security In Wake Of Hacking Scandal
    Apple is planning to increase security of its iCloud service by adding alerts, company CEO Tim Cook told The Wall Street Journal on Thursday. Cook... Read more: Apple Hacking Scandal, Video, Apple, Icloud Security, Nude Photo Hacking Sc…
    - 19 days ago Thursday, September 4, 2014 -
  • Hacker Succeeds In Breaking Into HealthCare.gov For First Time
    A hacker broke into HealthCare.gov and installed malicious software on one of its servers in the first successful breach of the health insurance excha... Read more: Government Hackers, Obamacare Security, Obamacare, healthcare.gov Hacked…
    - 19 days ago Thursday, September 4, 2014 -
  • CreditSesame.com: Home Depot's Hack Response in Three Little Words
    If the Home Depot breach turns out to be as bad or worse than the Target breach, certain things will be unavoidable for the home improvement giant. But there are some things the company can do to help reduce the short and long term impact and cost.…
    - 19 days ago Thursday, September 4, 2014 -
  • Sarah Granger: How the Celebrity Photo Hack Affects the Rest of Us
    It's our Internet, and if we don't take care of it, it won't take care of us. Read more: Internet, Books, Privacy, Hackers, Celebrities, Technology News
    - 20 days ago Wednesday, September 3, 2014 -
  • Adam Levin: 5 Reasons Not to Look for Those Nude Celebrity Photos
    If you are not particularly worried about being high-minded here, there is another consideration, which is, by looking at the pictures, you are giving criminals a purpose for their act (at least with a degree or so of separation) and causing someone…
    - 20 days ago Wednesday, September 3, 2014 -
  • Maya Zuckerman: Culture Hacking 101
    I am a 'culture hacker'. It's a curious term that is often confused with computer hackers and other technologists whose activities oftentimes invite suspicion. Read more: Burning Man, Hacker, Art, San Francisco, Hackers, Culture, Impact…
    - 21 days ago Tuesday, September 2, 2014 -
  • CreditSesame.com: The Big Lie Behind the Biggest Data Breaches
    Enough with the data breach excuses already. Not only are they as jaded as the breaches themselves, they're often just not true. In the aftermath of almost every data breach, chances are you're only going to get a boilerplate public statement.…
    - 21 days ago Tuesday, September 2, 2014 -
  • Celebrities Are Ridiculously Easy To Hack. Here's Why.
    Celebrities may be better-looking, more talented and more famous than you, but the trade-off is that they're ridiculously easy to hack.That's beca... Read more: Celebrity Nude Photos, Celebrity Icloud Hack, Nude Photos Hacked, Security…
    - 21 days ago Tuesday, September 2, 2014 -
  • Robert Siciliano: Majority of Executives Believe Attackers Will Overcome Corporate Defenses
    Many technology executives don't have a favorable outlook on their ability to sideswipe cybercriminals, according to research conducted by McKinsey and World Economic Forum. Read more: Identity Theft, Technology, Business, Hacking, Credi…
    - 24 days ago Saturday, August 30, 2014 -
  • newFarewell, Bonny Bodhi?
    Well autumn is nigh upon us here in the Northern reaches of the Linux blogosphere, and any day now the a/c will downshift to "medium" over at the Broken Windows Lounge. Oktoberfest ales are selling like hotcakes, and more than a few bloggers are rejo…
    - 11 hours ago Monday, September 22, 2014 -
  • newSony's PlayStation TV Could Be a Busy Little Gadget
    Sony Computer Entertainment on Monday confirmed that nearly 700 games will be available for its PlayStation TV system when it launches in North America on Oct. 14. They will include popular and classic franchises such as Killzone: Mercenary, Final Fa…
    - 16 hours ago Monday, September 22, 2014 -
  • newMarriott Plays With Sensory-Rich Virtual Reality Getaways
    Marriott Hotels last week introduced a new vacation opportunity: instant teleportation from New York City to the beaches of Hawaii or downtown London -- no uncomfortable airplane trip required. The journeys are virtual, using 4D sensory technology ba…
    - 19 hours ago Monday, September 22, 2014 -
  • newThe Coming Virtual Lifestyle Revolution
    Uplinq, Qualcomm's big -- and it was big -- developers' conference, took place last week. There were two parts that were particularly interesting. One was its new robotics effort, and the other was the announcement that it's pushing Vuforia, its augm…
    - 1 day ago Monday, September 22, 2014 -
  • newGadget Ogling: Amazon on Fire, Virtual Reality, True Nature and Energy Relief
    Apple might be the flavor of the minute as new iPhones hit stores, but Amazon isn't ready to let its rival hog all the limelight. Without a flashy presentation, it unveiled a half-dozen new Fire tablets and Kindle e-readers. There's a 6-inch Fire HD…
    - 3 days ago Saturday, September 20, 2014 -
  • Android L Will Keep Your Secrets Safer
    Hard on the heels of increased security measures in Apple's newly released iOS 8, Google this week confirmed that encryption will be turned on by default in the next release of Android. Android has offered encryption for more than three years, and ke…
    - 4 days ago Friday, September 19, 2014 -
  • Apple Fills iOS 8 Security Basket to Brim
    With data thefts and cybersnooping making headlines daily, security has started to capture the attention of the disciples of the digital lifestyle -- and if the latest version of iOS is any indication, it's catching the attention of Apple, too. Along…
    - 4 days ago Friday, September 19, 2014 -
  • Opera Sings for Linux Users, With Just a Few Sour Notes
    Opera offers an interesting alternative to the Google Chrome and Mozilla Firefox Web browsers, but its recent Linux release leaves some room for improvement. Opera previously enjoyed a reputation as the go-to browser of choice for mobile environments…
    - 4 days ago Thursday, September 18, 2014 -
  • Amazon Gets All Fired Up
    Amazon on Wednesday introduced a slew of new Kindle Fire tablets and Kindle e-readers. It also unveiled a new OS based on Android KitKat. The top-of-the-line product is the company's Fire HDX 8.9, which sports a Qualcomm Snapdragon 805 quad-core proc…
    - 5 days ago Thursday, September 18, 2014 -
  • Harmony Takes Control of Home Sweet Automated Home
    Logitech has announced four new products for the smart home in its Harmony family that let users control TVs, set-top boxes, speakers, lighting, thermostats, door locks, window shades and more. Users can trigger activities such as dimming the house l…
    - 5 days ago Thursday, September 18, 2014 -
  • Early iPhone 6 Reviewers Might as Well Be Rating Vacuum Cleaners
    With every new iPhone release, Apple delivers a handful of new iPhones to a select few industry journalists to review. How are those journalists and publications selected? First, they are known to appreciate the Apple aesthetic -- they have written d…
    - 5 days ago Thursday, September 18, 2014 -
  • new'Facebook To Begin Charging Users $2.99 / Month' — Totally BULLSHIT!
    Facebook going to charge users per month?? Nobody expected such a news story this week, but it seems that Facebook will No longer be a Free Service, according to reports claimed by the National Report, "Facebook To Begin Charging Users $2.99/mo Start…
    - 3 hours ago Tuesday, September 23, 2014 -
  • newLimitless Keylogger Optimized with AutoIT Infected thousands of Computers
    A new surge of malware has been discovered which goes on to infect hundreds of thousands of computers worldwide and allegedly steals users’ social and banking site credentials.Few days back, a list of 5 million combinations of Gmail addresses a…
    - 3 hours ago Tuesday, September 23, 2014 -
  • newMore Celebrity Nude Photos Leaked — Kim Kardashian and Others Targeted
    So far people have not forgotten about the recent celebrity iCloud hacking scandal, a new wave of nude photographs of celebrities have been leaked in what appears to be the second edition of the massive leak related to the celebrities intimate-images…
    - 18 hours ago Monday, September 22, 2014 -
  • newNext 'Android L' To Enable Full Disk Encryption By Default
    The search engine giant Google will soon come up with its next version of Android operating system, dubbed as Android L, with full-disk encryption enabled by default, Google confirmed Thursday. This will be for the first time that Google’s And…
    - 23 hours ago Monday, September 22, 2014 -
  • newHacking any eBay Account in Just 1 Minute
    Four month ago, a massive data breach on the eBay website affected 145 million registered users worldwide after its database was compromised. Meanwhile, another critical vulnerability on the eBay website was reported, allowing an attacker to hijack m…
    - 24 hours ago Monday, September 22, 2014 -
  • newHow To Run Almost Any Android App On Windows, OS X, Linux with Chrome
    From last week, Google began paving the way to run Android apps on Chrome Operating System through the project named "App Runtime for Chrome", but the release came with a lot of limitations – it only supported certain Android apps and on Chrome OS…
    - 1 day ago Monday, September 22, 2014 -
  • newMalicious Google DoubleClick Advertisements Distributed Malware to Millions of Computers
    Cyber criminals have exploited the power of two online advertising networks, Google's DoubleClick and popular Zedo advertising agency, to deliver malicious advertisements to millions of internet users that could install malware on a user's computer.…
    - 2 days ago Sunday, September 21, 2014 -
  • newAvira Vulnerability Puts Users' Online Backup Data At Risk
    A popular Anti-virus software Avira that provides free security software to its customers with Secure Backup service is vulnerable to a critical web application vulnerability that could allow an attacker to take over users’ account, putting million…
    - 3 days ago Saturday, September 20, 2014 -
  • Yahoo Quickly Fixes SQL Injection Vulnerability Escalated to Remote Code Execution
    Yahoo! was recently impacted by a critical web application vulnerabilities which left website's database and server vulnerable to hackers. A cyber security expert and penetration tester, Ebrahim Hegazy a.k.a Zigoo from Egypt, has found a serious…
    - 3 days ago Saturday, September 20, 2014 -
  • How to Detect SQL Injection Attacks
    SQL Injection (SQLi) attacks have been around for over a decade. You might wonder why they are still so prevalent. The main reason is that they still work on quite a few web application targets. In fact, according to Veracode’s 2014 State of Securi…
    - 4 days ago Friday, September 19, 2014 -
  • 'The Home Depot' Data Breach Put 56 Million Payment Cards at Risk
    Home Depot, the nation’s largest home improvement retailer, announced on Thursday that a total of 56 million unique payment cards were likely compromised in a data breach at its stores, suggesting that the data breach on Home improvement chain was…
    - 4 days ago Friday, September 19, 2014 -
  • Chinese Hackers Hacked Into U.S. Defense Contractors 20 Times In Just One Year
    Chinese hackers associated with the Chinese government have successfully infiltrated the computer systems of U.S. defense contractors working with the government agency responsible for the transportation of military troops and goods across the globe,…
    - 5 days ago Thursday, September 18, 2014 -
  • Adobe Releases Critical Security Updates for Acrobat and Reader
    After a week delay, Adobe has finally pushed out critical security updates for its frequently-attacked Reader and Acrobat PDF software packages to patch serious vulnerabilities that could lead to computers being compromised.The new versions of Ad…
    - 5 days ago Thursday, September 18, 2014 -
  • Apple Rolls Out iOS 8 with Bucket of Security Fixes
    Apple has finally released iOS 8, the latest version of its operating system, for free to iPhone, iPad and iPod touch users. The company has assured that the latest iOS 8 update is a significant step away up from iOS 7.You can grab the new updat…
    - 5 days ago Thursday, September 18, 2014 -
  • How a Cell Phone User Can be Secretly Tracked Across the Globe
    Since we are living in an era of Mass surveillance conducted by Government as well as private sector industries, and with the boom in surveillance technology, we should be much worried about our privacy. According to the companies that create sur…
    - 6 days ago Wednesday, September 17, 2014 -
  • Malicious Kindle Ebook Let Hackers Take Over Your Amazon Account
    If you came across a Kindle e-book download link from any suspicious sources or somewhere other than Amazon itself, check twice before you proceed download. As downloading an eBook could put your personal information at risk. A security researche…
    - 6 days ago Wednesday, September 17, 2014 -
  • Win Apple's iPhone 6 For Free – A New Facebook Scam
    Apple's iPhone 6 FREE ? Of course not ! It’s only a hoax, but scammers have announced the just release iPhone 6 free.Another Facebook scam is circulating across the popular social networking website just days after Apple unveiled its upcoming i…
    - 6 days ago Wednesday, September 17, 2014 -
  • New Android Browser Vulnerability Is a “Privacy Disaster” for 70% Of Android Users
    A Serious vulnerability has been discovered in the Web browser installed by default on a large number (Approximately 70%) of Android devices, that could allow an attacker to hijack users' open websites, and there is now a Metasploit module available…
    - 6 days ago Tuesday, September 16, 2014 -
  • Twitter Vulnerability Allows Hacker to Delete Credit Cards from Any Twitter Account
    At the beginning of this month, just like other social networks, Twitter also started paying individuals for any flaws they uncover on its service with a fee of $140 or more offered per flaw under its new Bug Bounty program, and here comes the claima…
    - 7 days ago Tuesday, September 16, 2014 -
  • Harkonnen Operation — Malware Campaign that Went Undetected for 12 Years
    A huge data-stealing cyber espionage campaign that targeted Banks, Corporations and Governments in Germany, Switzerland, and Austria for 12 years, has finally come for probably the longest-lived online malware operation in history.The campaign is…
    - 7 days ago Tuesday, September 16, 2014 -
  • Google Public DNS Server Spoofed for SNMP based DDoS Attack
    The Distributed Denial of Service (DDoS) attack is becoming more sophisticated and complex, and, according to security experts, the next DDoS vector to be concerned about is SNMP (Simple Network Management Protocol) amplification attacks.Yesterda…
    - 7 days ago Tuesday, September 16, 2014 -
  • 16-year-old Invents Device that Can Convert Breath to Speech
    A High-school student Arsh Shah Dilbagi has invented a portable and affordable device that converts breath into speech, helping people suffering from different developmental disabilities like locked-in syndrome, Parkinson's, or ALS to communicate usi…
    - 8 days ago Monday, September 15, 2014 -
  • Treasure Map — Five Eyes Surveillance Program to Map the Entire Internet
    The National Security Agency and its British counterpart, GCHQ, gained secret access to the German telecom companies’ internal networks, including Deutsche Telekom and Netcologne, in an effort to “map the entire Internet — any device, anywhere,…
    - 8 days ago Monday, September 15, 2014 -
  • Windows 9 Start Menu Demo Video Leaked Online
    After providing the glimpses of the next Windows, one of the screenshot leakers has now obtained a short video showing off a build of the very new Windows 9, aka "Threshold," features as well as how users can expect to use it.Two German sites, C…
    - 10 days ago Saturday, September 13, 2014 -
  • NSA threatened Yahoo with $250,000 Daily Fine For Opposing Surveillance Request
    Yahoo! has broke its silence and explained why it handed over its users’ data to United States federal officials, thereby promising to expose those court documents which ordered the snooping.The US government threatened Internet giant with a $2…
    - 11 days ago Friday, September 12, 2014 -
  • Luring The Elusive Cyber Security Pro
    Struggling to find scarce IT security talent? Make sure your hiring managers understand the certifications and match candidates for skills fit -- not just credentials.
    - Monday, April 14, 2014 -
  • Amazon Plans 3D Phone: Report
    Amazon phone capable of displaying images in three dimensions could ship this fall.
    - Saturday, April 12, 2014 -
  • Google Glass Goes Public
    Google Glass Explorer Program will be open to US-based adults on tax day.
    - Saturday, April 12, 2014 -
  • Facebook Changes: What To Expect
    Facebook cracks down on spammy posts, tweaks privacy options, and revamps messaging. Here's what it means to you.
    - Saturday, April 12, 2014 -
  • Hacker Weev Free After Appeal
    Andrew "Weev" Auernheimer, who embarrassed AT&T by exposing a security flaw, had his conviction overturned by federal appeals court.
    - Friday, April 11, 2014 -
  • Rogue IT Driven By Need For Speed
    We've lost control to business users before. But this time, the thing that initiated our pain (the cloud) may also be the cure.
    - Friday, April 11, 2014 -
  • 5 Ways Android Won Me Over
    From security to "Lego" programming, Android has more going for it than you might think.
    - Friday, April 11, 2014 -
  • 5 Job Interview Tips Via Alice In Wonderland
    Curiouser and curiouser! Use these techniques during your next interview to win that IT or security job offer.
    - Thursday, April 10, 2014 -
  • Google Glass For Parkinson's: 10 Findings
    Google Glass offers more health benefits than awkwardness, Parkinson's patients in UK study find.
    - Thursday, April 10, 2014 -
  • Hackathons Should Be More Than A Circus
    Tapping into developer talent at a hackathon should be fun, but don't lose sight of the potential business benefits.
    - Thursday, April 10, 2014 -
  • 5 reasons why hackers own your organization
    Last week I noted that most companies are either already hacked or could easily be hacked -- and, when they have anything worth stealing, are probably already owned by multiple APT (advanced persistent threat) groups.
    - 7 days ago Tuesday, September 16, 2014 -
  • How network virtualization is used as a security tool
    When people think of network virtualization, the advantages that come to mind typically include faster provisioning of networks, easier management of networks and more efficient use of resources. But network virtualization can have another major bene…
    - 8 days ago Monday, September 15, 2014 -
  • Sprint, Windstream traffic routing errors hijacked other ISPs
    Internet traffic routing errors made by U.S. operators Sprint and Windstream on the same day last week underscore a long-known Internet weakness, posing both security and reliability issues. Both of the errors involved Border Gateway Protocol (BGP),…
    - 8 days ago Monday, September 15, 2014 -
  • Data protection authorities find privacy lapses in majority of mobile apps
    Many mobile apps request too many permissions and don't explain how they collect users' personal information, a study of 1,211 popular apps by the Global Privacy Enforcement Network has found. The majority of the apps reviewed did not adequately expl…
    - 11 days ago Friday, September 12, 2014 -
  • Yahoo says it faced $250,000 daily fines for defying U.S. surveillance requests
    The U.S. government once threatened to fine Yahoo $250,000 a day if it failed to assist with its surveillance efforts, Yahoo said Thursday. Yahoo said it was threatened with the fines after it challenged surveillance powers granted to the U.S. govern…
    - 11 days ago Friday, September 12, 2014 -
  • How Google's tiff with certificate authorities can impact you
    Miffed certificate authorities are calling on Google to give websites more time to upgrade the security used in browser-to-server communications before displaying warnings in Chrome. The CAs are upset over Google's roughly six-month timetable for rat…
    - 12 days ago Thursday, September 11, 2014 -
  • Enemies no more, McAfee and Symantec agree to share threat data
    The recently launched Cyber Threat Alliance has been given a big boost with the news that Intel's McAfee division and former arch-enemy Symantec are to join the industry group whose mission is to create the first significant cross-vendor movement of…
    - 12 days ago Thursday, September 11, 2014 -
  • 3 security practices IoT will disrupt
    I made it back from DEFCON with both my phone and tablet intact, but I'm happy I didn't bring a light bulb. You see, if had brought a light bulb, and that light bulb was a smart LED bulb running Linux, it might be running someone else's software by n…
    - 12 days ago Thursday, September 11, 2014 -
  • Five million Gmail addresses and passwords dumped online
    An archive containing nearly 5 million Gmail addresses and plain text passwords was posted Tuesday on an online forum, but the data is old and likely sourced from multiple data breaches according to one security firm. A user with the online alias "tv…
    - 13 days ago Wednesday, September 10, 2014 -
  • Internet Explorer steals the Patch Tuesday spotlight again
    It's hard to imagine that we are already three-fourths of the way through 2014 -- at least as measured by Microsoft Patch Tuesdays. Today, Microsoft released four new security bulletins, but only one of them is Critical. Guess which one?
    - 13 days ago Wednesday, September 10, 2014 -
  • Cloud security: We're asking the wrong questions
    In the wake of the celebrity photo breach, the media is humming with stories disparaging the safety of the cloud.
    - 13 days ago Wednesday, September 10, 2014 -
  • Adobe fixes critical flaws in Flash Player, delays Reader and Acrobat updates
    Adobe Systems released a critical security update for Flash Player that fixes 12 security vulnerabilities, but pushed back its planned patches for Reader and Acrobat by a week. The Flash Player updates, available for Windows, Mac, and Linux, address…
    - 14 days ago Tuesday, September 9, 2014 -
  • Comcast's open Wi-Fi hotspots inject ads into your browser
    Comcast is giving users a very good reason to demand an HTTPS connection on every site they visit. The Internet service provider has started injecting ads for its services on websites where you wouldn't normally see them when you're using an Xfinity…
    - 14 days ago Tuesday, September 9, 2014 -
  • Salesforce.com warns customers of malware attack
    Salesforce.com users are being targeted by a new version of a computer Trojan that has typically attacked online banking customers until now. The malware threat is called Dyre or Dyreza and came to light in June. Like most online banking Trojans, it…
    - 14 days ago Tuesday, September 9, 2014 -
  • What you need to know about the Home Depot data breach
    On Monday, Home Depot issued a public confirmation to reports that they had experienced a data breach impacting debit and credit cards. They're the world's largest home improvement retailer, operating 2,266 stores in the U.S., as well as 10 Canadian…
    - 14 days ago Tuesday, September 9, 2014 -
  • Tech industry groups ask U.S. Senate to 'swiftly pass' NSA curbs
    Tech industry organizations have written a letter to leaders in the U.S. Senate, to ask them to swiftly pass the USA Freedom Act, legislation that is expected to end the collection of bulk domestic phone data by the National Security Agency.
    - 14 days ago Tuesday, September 9, 2014 -
  • Home Depot confirms breach of its payment systems
    Home Depot said Monday that its payment systems had been breached, potentially affecting any customers who shopped at its stores in the United States and Canada since April. There's no evidence yet that debit card PIN numbers had been compromised, th…
    - 15 days ago Monday, September 8, 2014 -
  • IBM secures SoftLayer with Intel trusted modules
    Fortifying its SoftLayer cloud services for enterprise use, IBM has started using Intel's chip-based Trusted Execution Technology to help organizations in highly regulated industries meet their auditing and security compliance requirements. On Monday…
    - 15 days ago Monday, September 8, 2014 -
  • Adobe slates critical Reader security update for Tuesday
    Adobe yesterday said it would issue security updates next week for its PDF viewer Reader as well as for Acrobat, its PDF creator, to fix critical flaws in the software on Windows and Apple's OS X. But it won't be updating Flash Player, its ultra-popu…
    - 18 days ago Friday, September 5, 2014 -
  • Apple CEO says iCloud security will be strengthened
    Apple, still reeling from the nude celebrity photo incident, plans to soon strengthen security around its iCloud storage service, according to CEO Tim Cook in a news report Thursday.
    - 18 days ago Friday, September 5, 2014 -
  • CloudFlare can provide its caching service without your SSL keys
    CloudFlare said it has engineered a novel way to handle sensitive encryption keys that allows organizations such as financial institutions to still use its caching service to fend off cyberattacks.The breakthrough, called "Keyless SSL," is a new me…
    - 4 days ago Friday, September 19, 2014 -
  • Home Depot confirms breach impacted 56 million customers
    On Thursday, Home Depot released an update on the status of their breach investigation. The update didn't include many details, but the retailer did confirm that the incident impacted 56 million customers, making their breach larger than the inciden…
    - 5 days ago Thursday, September 18, 2014 -
  • Fixing HealthCare.gov security
    While the security weaknesses found in HealthCare.gov by a U.S. government watchdog need to be addressed, they are not unusual for sites as complex as the federal insurance exchange, experts say.In a report released Tuesday, the Government Accounta…
    - 5 days ago Thursday, September 18, 2014 -
  • Hackers accessed Goodwill hosting provider for 18 months before card breach
    Hackers evaded security systems for a year-and-a-half at a hosting center that processed payment cards for Goodwill Industries, using the same type of malware that struck Target and other major retailers to steal card data, according to the charity's…
    - 6 days ago Wednesday, September 17, 2014 -
  • IDG Contributor Network: Number 1 on my top 10 list for security executives: History’s lessons
    I recently kicked off a new series of blogs based on the top 10 threats, trends and business priorities for security executives. This is part one: History's lessons.Stability is an illusionIn security, such is the universe, change is constant. If we…
    - 8 days ago Monday, September 15, 2014 -
  • How network virtualization is used as a security tool
    When people think of network virtualization, the advantages that come to mind typically include faster provisioning of networks, easier management of networks and more efficient use of resources. But network virtualization can have another major ben…
    - 8 days ago Monday, September 15, 2014 -
  • Data protection authorities find privacy lapses in majority of mobile apps
    Many mobile apps request too many permissions and don't explain how they collect users' personal information, a study of 1,211 popular apps by the Global Privacy Enforcement Network has found.The majority of the apps reviewed did not adequately exp…
    - 11 days ago Friday, September 12, 2014 -
  • Your configuration files are showing
    One of my favorite activities is using search engines to hunt for things that, realistically, I should not be able to find. Recently, I was able to find thousands of sites with their databases exposed. This time I was able to unearth a treasure trove…
    - 12 days ago Thursday, September 11, 2014 -
  • Vulnerability in popular Joomla e-commerce extension puts online shops at risk
    A critical vulnerability in a popular e-commerce extension for the Joomla content management system allows malicious users to gain super-admin privileges to sites that run the software.The VirtueMart extension, which allows users to set up online s…
    - 12 days ago Thursday, September 11, 2014 -
  • Five million Gmail addresses and passwords dumped online
    An archive containing nearly 5 million Gmail addresses and plain text passwords was posted Tuesday on an online forum, but the data is old and likely sourced from multiple data breaches according to one security firm.A user with the online alias "t…
    - 13 days ago Wednesday, September 10, 2014 -
  • Adobe fixes critical flaws in Flash Player, delays Reader and Acrobat updates
    Adobe Systems released a critical security update for Flash Player that fixes 12 security vulnerabilities, but pushed back its planned patches for Reader and Acrobat by a week.The Flash Player updates, available for Windows, Mac and Linux, address…
    - 13 days ago Wednesday, September 10, 2014 -
  • Microsoft Patch Tuesday thwarts nosey malware
    Cyberattackers curious about the contents of users' hard drives will now have a tougher time finding that information, thanks to a new patch that Microsoft issued Tuesday in the latest round of "Patch Tuesday" bug fixes.This iteration of Patch Tues…
    - 13 days ago Wednesday, September 10, 2014 -
  • Juniper expands threat intelligence for more effective network defense
    You may have heard that two heads are better than one—the basic premise being that different perspectives bring more to the table and enable the combined team to make better, more effective decisions. The same thing is true when it comes to threat…
    - 14 days ago Tuesday, September 9, 2014 -
  • Salesforce warns customers of malware attack
    Salesforce.com users are being targeted by a new version of a computer Trojan that has typically attacked online banking customers until now.The malware threat is called Dyre or Dyreza and came to light in June. Like most online banking Trojans, it h…
    - 14 days ago Tuesday, September 9, 2014 -
  • Hackers launch Apple ID phishing campaign playing on iCloud security worries
    The hackers behind the Kelihos botnet are trying to capitalize on users' increased awareness about the security of Apple online accounts through a new phishing campaign.According to security researchers from Symantec, the Kelihos botnet has started s…
    - 14 days ago Monday, September 8, 2014 -
  • Cyberespionage group starts using new Mac OS X backdoor program
    A group of hackers known for past cyberespionage attacks against the U.S. Defense Industrial Base, as well as companies from the electronics and engineering sectors, has recently started using a backdoor program to target Mac OS X systems."The backdo…
    - 15 days ago Monday, September 8, 2014 -
  • LinkedIn beefs up account security with session management, detailed alerts
    Professional networking site LinkedIn is rolling out new features that allow users to easily manage authenticated sessions across multiple devices and better understand what caused security-related changes on their accounts.The site has added a new p…
    - 18 days ago Friday, September 5, 2014 -
  • Configuration errors lead to HealthCare.gov breach
    The Health and Human Services Department (HHS) said that HealthCare.gov, the nation's health insurance enrollment website, was breached in July and that the attackers uploaded malware to the server.The breach, which is the first successful intrusio…
    - 19 days ago Thursday, September 4, 2014 -
  • Twitter launches bug bounty program
    Following in the footsteps of other major Internet companies, Twitter has started paying monetary rewards to security researchers who find and report vulnerabilities in its Web services and mobile apps.In recent years, bug bounty programs have become…
    - 19 days ago Thursday, September 4, 2014 -
  • Attack hijacks DNS settings on home routers in Brazil
    An ongoing attack in Brazil tricks users into visiting malicious websites that attempt to silently change the Domain Name System settings of their home routers.If the attack is successful, the routers are reconfigured to use rogue DNS servers that re…
    - 20 days ago Wednesday, September 3, 2014 -
  • newBLAM, BLAM, BLAM... nooooo! Hacker crew Lizard Squad spits DDoS venom on <i>Call of Duty</i>
    JUST before you blasted 2 'copters with 1 rocket launcher Hackers from the group Lizard Squad have reneged on their promise to quit earlier this month, apparently launching distributed denial-of-service (DDoS) attacks on major gaming industry website…
    - 3 hours ago Tuesday, September 23, 2014 -
  • newApple passcode-protects iOS 8 devices, but cops can still inhale your iCloud
    Don't congratulate yourselves too soon, Apple – securobod Improved security features in iOS 8 prevent Apple from unlocking phones – even for law enforcement. But search warrant-holding cops can still get almost everything through iCloud backups,…
    - 4 hours ago Tuesday, September 23, 2014 -
  • new80 PER CENT of app devs SUCK at securing your data, study finds
    Ignore that, look at my shiny-shiny Developers are experts in spinning wonderfully-shiny, horribly-insecure apps, according to research from Aspect Security.…
    - 5 hours ago Tuesday, September 23, 2014 -
  • newGame pirates 'donate' compute power to Bitcoin miners
    Repack cracks foists Bitcoin miner hack Hundreds of video game pirates have generously, if inadvertently, donated their compute resources to virus writers by downloading Bitcoin miner-infected torrent listings.…
    - 7 hours ago Tuesday, September 23, 2014 -
  • newDyslexic, dyspraxic? No probs, says GCHQ
    Unique minds set to code-breaking The British Government Communications Headquarters (GCHQ) says it employs 120 dyslexic and dyspraxic staff for code breaking and counter-espionage.…
    - 7 hours ago Tuesday, September 23, 2014 -
  • newMushy spam law's IDEAL for toothless watchdog: Spamhaus slams CAN-SPAM
    One in 10 non-compliance? It's worse than that, even in the US Antispam organisation Spamhaus has reacted phlegmatically to a recent survey that one in 10 of the world’s largest online retailers are still violating the CAN-SPAM Act, a full 10 years…
    - 1 day ago Monday, September 22, 2014 -
  • newExercise-tracking app not QUITE fit for purpose
    MyFitnessPro splats bug in two days Popular fitness app MyFitnessPal, used by 65 million people, has fixed a vulnerability that exposed personal information including date of birth records.…
    - 1 day ago Monday, September 22, 2014 -
  • newWho.is does the Harlem Shake
    Blame it on LOLing XSS terroristas Websites across the internet are doing the Harlem Shake after online comedians began exploiting cross site scripting (XSS) flaws that make pages dance and speakers blare.…
    - 1 day ago Monday, September 22, 2014 -
  • newYour location info is too revealing: data boffins
    Anonymity by a thousand cuts A group of researchers partly supported by SAP has taken a look at one of the big problems with so-called “anonymised” data: the way spatial correlations in mobile data can be used to re-identify individuals in large…
    - 1 day ago Monday, September 22, 2014 -
  • newHome Depot ignored staff warnings of security fail laundry list
    'Just use cash', former security staffer warns friends Home Depot is facing claims it ignored security warnings from staff, who say prior to its loss of 56 million credit cards, it failed to update anti virus since 2007, did not consistently monitor…
    - 1 day ago Sunday, September 21, 2014 -
  • newCloudFlare ditches private SSL keys for better security
    'Sorry, spooks, we can't decrypt this for you' CloudFlare has announced the outcome of what it says is two years' work – switching on Keyless SSL – which lets customers encrypt their web traffic via the company's services without having to hand o…
    - 1 day ago Sunday, September 21, 2014 -
  • newNew UK.gov DATA SLURPING diplomat to push US telcos to share more subscriber info
    When a DRIP becomes a flood The British government has appointed a senior diplomat who will act as a go-between on overseas data access jurisdiction issues, to push communication providers - particularly those based in the US - to share more informat…
    - 2 days ago Sunday, September 21, 2014 -
  • new'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
    More alleged private, nude celeb pics appear online A new round of what appear to be private, naked photos of female celebrities including US television reality star Kim Kardashian have apparently been leaked online.…
    - 2 days ago Sunday, September 21, 2014 -
  • newBargain basement iPhone shoppers BEWARE! eBay exposes users to phishing vuln
    Tat bazaar downplays malicious attack on multiple auctions eBay bans the use of cross-site scripting on the online tat bazaar because it can open up the site's users to nasty phishing vulnerabilities. And yet, according to the BBC, some auction listi…
    - 2 days ago Sunday, September 21, 2014 -
  • Apple's warrant canary riddle: Cock-up, conspiracy, or anti-Google point-scoring
    Please pick one, Tim Analysis  The internet was in a tizzy this week following the disappearance of what's assumed to be a warrant canary in Apple's latest report on governments demanding users' private data.…
    - 3 days ago Friday, September 19, 2014 -
  • Blood-crazed Microsoft axes Trustworthy Computing Group
    Security be not a dirty word, me Satya. But crevice, bigod... Microsoft is closing its Trustworthy Computing Group as part of the loss of 2,100 jobs in a restructuring plan unveiled on Thursday.…
    - 4 days ago Friday, September 19, 2014 -
  • TOR users become FBI's No.1 hacking target after legal power grab
    Be afeared, me hearties, these scoundrels be spying our signals The FBI wants greater authority to hack overseas computers, according to a law professor.…
    - 4 days ago Friday, September 19, 2014 -
  • Russian botnet suspects cuffed over romantic MMS spyware allegs
    Avast! Belay that 'RomanticVK' order - there be MONSTERS Russian cops have arrested two mobile botnet cybercrime suspects as part of an ongoing investigation that's reckoned to be the first of its kind in Russia.…
    - 4 days ago Friday, September 19, 2014 -
  • Google Apple grapple brings crypto cop block to Android
    Belike tears of joy to this old seadog's eyes, laddie Google is set to build default encryption into its new Android fondleslabs in a bid to foil police forensics (and maybe to copy or catch up with Apple).…
    - 4 days ago Friday, September 19, 2014 -
  • Samsung unlocks Knox at zero bucks
    The race to zero in the mobile device management market has begun Samsung has dropped the cost of its mobile device management (MDM) suite Knox to $0.…
    - 4 days ago Thursday, September 18, 2014 -
  • Google bloke Beer buzzes iOS 8, OS X in bug-busting bonanza bash
    Apple's turn to get the drinks in, amirite? Apple has crushed a tonne of bugs across its products including 53 vuln fixes in iOS 8 and a heap of others in OS X Mavericks, the majority reported by Google researcher Ian Beer.…
    - 4 days ago Thursday, September 18, 2014 -
  • Home Depot: 56 million bank cards pwned by malware in our tills
    That's about 50 per cent bigger than the Target tills mega-hack Home Depot today admitted 56 million bank cards are at risk after they were used in malware-infected tills.…
    - 5 days ago Thursday, September 18, 2014 -
  • Snowden's NSA leaks have galvanised the storage world
    Vendors raise their game after gov securo-busting revealed Anyone following the fortunes of the world’s biggest technology companies will have noticed a trend: every one of them has gone potty for privacy.…
    - 5 days ago Thursday, September 18, 2014 -
  • Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
    Anyone claiming to know before tomorrow is telling porkies Web users have been warned to be wary of fake results messages about the Scottish Independence referendum.…
    - 5 days ago Thursday, September 18, 2014 -
  • China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
    FBI et al knew of nine hacks - but didn't tell TRANSCOM Sophisticated Beijing-backed hackers raided civilian organisations responsible for the movements of US troops and equipment 20 times in one year of which only two were detected by the responsibl…
    - 5 days ago Thursday, September 18, 2014 -
  • Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
    Intel bods' analysis concludes 'no significant change' after whistle was blown The Snowden leaks have not changed the way jihadi terorrists communicate, according to a new study.…
    - 5 days ago Thursday, September 18, 2014 -
  • Comprehensive guide to obliterating web apps published
    Open Web App Security Project releases new app dev opus The global security community has completed an 18-month effort to produce a guide it is hoped will boost the standard of web application testing and address new and dangerous technologies.…
    - 5 days ago Thursday, September 18, 2014 -
  • Apple's Cook: We have never allowed g-men access to Apple servers
    Only hackers can see your nude selfies, not feds Apple has made some amendments to its privacy policy, and has used the occasion to run an open letter from CEO Tim Cook explaining the changes.…
    - 5 days ago Thursday, September 18, 2014 -
  • Spies would need SUPER POWERS to tap undersea cables
    Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier? The Register has found itself subject to a certain amount of criticism for this author's scepticism regarding whether the NSA has been snooping on optical fibre ca…
    - 5 days ago Thursday, September 18, 2014 -
  • Boffins plot global (browser) cookie crumb trail
    Patchwork regulation creates silos of data and worldwide web of data bakers Privacy laws covering the use of personally-identifiable information are, on a global scale, creating a dizzying patchwork of cookie-cutter cookie-serving companies created t…
    - 5 days ago Wednesday, September 17, 2014 -
  • BitTorrent's peer-to-peer chat app Bleep goes live as public alpha
    A good day for privacy as invisble.im also reveals its approach to untraceable chats Bleep, the BitTorrent peer-to-peer chat client, is now out in the wild in the form of a public Alpha version.…
    - 5 days ago Wednesday, September 17, 2014 -
  • Critical Adobe Reader and Acrobat patches FINALLY make it out
    Eight vulns healed, including XSS and DoS paths Adobe belatedly pushed out critical updates for its frequently-attacked Reader and Acrobat PDF software packages on Tuesday.…
    - 6 days ago Wednesday, September 17, 2014 -
  • UK.gov lobs another fistful of change at SME infosec nightmares
    Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all Business secretary Vince Cable has announced a £4m fund to help small businesses fight cyber crime. This has not gone down well with the infosec world.…
    - 6 days ago Wednesday, September 17, 2014 -
  • Citadel Trojan phishes its way into petrochem firm's webmail
    Middle Eastern webmail servers popped Trusteer researchers are saying that the victims of the latest round of Citadel trojan infections includes one of the largest petrochemical companies in the world.…
    - 6 days ago Wednesday, September 17, 2014 -
  • Credit card cutting flaw could have killed EVERY AD on Twitter
    Party-pooper gets $2800 for ad-busting bug Twitter has patched a flaw in its service that allowed unauthorised users to delete every credit card from all accounts, potentially relieving the company of its advertising revenue, security researcher Ahme…
    - 6 days ago Tuesday, September 16, 2014 -
  • Cisco sprinkles Sourcefire goodies on ASA firewalls
    FirePOWER can be licensed into existing kit Cisco has taken the next step in wrapping the technology it acquired along with Sourcefire, by putting its Adaptive Security Appliance (ASA) next-gen firewalls and the FirePOWER technology into the blender…
    - 6 days ago Tuesday, September 16, 2014 -
  • Amazon REINTRODUCES Kindle swindle vulnerability
    Malware gives book thief grief Amazon has reintroduced and again fixed a flaw into its Kindle management page that allows attackers to commandeer accounts by booby trapping pirated books, researcher Benjamin Mussler says.…
    - 6 days ago Tuesday, September 16, 2014 -
  • Got your NUDE SELFIES in the cloud? Two-factor auth's your best bet for securing them
    Infosec made simple: 2FA, its good points and bad points Bill Gates in 2004 predicted the death of the password over time. “They just don’t meet the challenge for anything you really want to secure,” Gates said.…
    - 7 days ago Tuesday, September 16, 2014 -
  • Rejoice, Blighty! UK is the TOP of the WHOLE WORLD ... for PHISHING
    Thanks, gullible chumps - now everyone knows we're a soft touch British punters are being served three times as many phishing links to trojans and exploit kits than the US, and five times more than the Germans, according to a ProofPoint study.…
    - 7 days ago Tuesday, September 16, 2014 -
  • Israeli spies rebel over mass-snooping on innocent Palestinians
    'Disciplinary treatment will be sharp and clear' vow spy-chiefs Israeli politicians and a former military intelligence commander have hit back at reservists who criticized Israel for spying on ordinary Palestinians.…
    - 7 days ago Tuesday, September 16, 2014 -
  • Attackers tapping on SNMP door to see if it's open
    SANS spots new, dumb attack Google's DNS IP address is being spoofed by an attacker, apparently in an attempt to DDoS hosts vulnerable to a flaw in the SNMP protocol.…
    - 7 days ago Tuesday, September 16, 2014 -
  • THREE QUARTERS of Android mobes open to web page spy bug
    Metasploit module gobbles KitKat SOP slop A Metasploit module has been developed to easily exploit a dangerous flaw in 75 percent of Android devices that allows attackers to hijack a users' open websites.…
    - 7 days ago Tuesday, September 16, 2014 -
  • 'Speargun' program is fantasy, says cable operator
    We just might notice if you cut our cables The washup from yesterday's Dotcom-Snowden-Greenwald saga rolls on, with Southern Cross Cable Network angrily denying that New Zealand's spooks, the NSA, or anybody else for that matter has worked a tap into…
    - 7 days ago Tuesday, September 16, 2014 -
  • Hackers-for-hire raided 300 banks, corporates for TWELVE YEARS
    Phony cracker biz looked legit A band of hackers for hire have raided some 300 banks, corporations and governments undetected for 12 years, possibly the longest campaign of its kind.…
    - 7 days ago Monday, September 15, 2014 -
  • I saved Bitcoin and the PERFECT DRAFT OF HISTORY, says Assange
    Heat:kitchen equation saw WikiLeaks decide not to accept BTC donations until currency could flourish Julian Assange has alleged that Bitcoin “founder” Satoshi Nakamoto asked WikiLeaks not to use the cryptocurrency as a means of raising funds, for…
    - 7 days ago Monday, September 15, 2014 -
  • Bank IT bod accused of stealing $40 MEEELLION from employer
    Turns out there may actually be a Nigerian 'prince' out there with cash If you get an email from a hapless Nigerian prince who needs a hand shifting a few million dollars, the message will no doubt wing its way into your spam folder.…
    - 7 days ago Monday, September 15, 2014 -
  • Chinese 'Sogou Explorer' browser sends URLs to parts unknown
    APNIC sniffs the digital exhaust and finds 1 in 400 'net users have stalkers A Chinese-language cloud-based browser seems to be snooping on its users, according to research conducted by the Asia Pacific Network Information Centre's (APNIC's) Geoff Hu…
    - 7 days ago Monday, September 15, 2014 -
  • Yawn, Wikileaks, we already knew about FinFisher. But these software binaries...
    Latest Assange leakgasm includes full copies of spyware WikiLeaks is making the controversial FinFisher commercial spyware tool available for download as part of the latest in a series of leaks that have put the operations of the controversial busine…
    - 8 days ago Monday, September 15, 2014 -
  • Freenode IRC users told to change passwords after securo-breach
    Miscreants probably got in, you guys know the drill by now A security breach at popular, free and open source software-focused IRC network Freenode means users need to change their passwords.…
    - 8 days ago Monday, September 15, 2014 -
  • Hey, scammers. Google's FINE with your dodgy look-a-like apps
    Google Apps scripts could fool ANYONE, warns engineer Attackers can easily craft third party scripts to imitate Google to trick users into granting authorisation to their email accounts, says infosec chap Andrew Cantino.…
    - 8 days ago Monday, September 15, 2014 -
  • Parental Controls For YouTube
    Kids seem to be glued to YouTube these days. As a parent, it can be daunting to try and police the content that they watch. What's a parent to do?In our featured article: YouTube Parental Controls...Read Full Post
    - Saturday, May 31, 2014 -
  • Craigslist Safety and Security Tips
    Craigslist can be both a fun and scary place. You never know what you'll find for sale, and you often don't know who is on the other end of that sale until you complete the deal....Read Full Post
    - Saturday, May 31, 2014 -
  • 5 Tips to Help You Land an IT Security Job
    IT security jobs are still in high demand, especially given the fact that cyber crime seems to be a constant fixture in the news with data breaches becoming an almost daily occurrence....Read Full Post
    - Saturday, May 31, 2014 -
  • How to Avoid Becoming a Victim of the iPhone Lock Ransom Scam
    There is a new scam sweeping through Australia and other parts of the world this week. Victims are having their iPhones locked remotely by hackers who apparently compromised their iCloud account credentials. The victims are then being issued ransom d…
    - Saturday, May 31, 2014 -
  • Are Your Employees Leaking Sensitive Company Information on Facebook?
    Like it or not, Facebook is here to stay. Some companies allow employees to use Facebook at work and some strictly prohibit it. If your company allows it then you might want to continue reading....Read Full Post
    - Thursday, May 29, 2014 -
  • Rev up Your Security with a 10-minute PC Security Tune-up
    Securing your PC doesn't have to take hours and hours of your time. There are a lot of things you can do in just a few minutes to help improve your security posture....Read Full Post
    - Thursday, May 29, 2014 -
  • How to Prevent Your Web Browser From Being Hijacked
    Did you just try to Google something but instead of going to Google, your browser took you to some strange search engine you've never heard of?You might have just become a victim of browser hijacking. In this week's featured article: How to Prevent…
    - Wednesday, May 28, 2014 -
  • Are Your Clicks Getting Jacked?
    Have you ever been clickjacked? While it may sound like some kind of pro wrestling move, I assure you it is not.Clickjacking is a security threat that users all over the world are experiencing. How can you stay safe from clickjacking? Check out our…
    - Wednesday, April 30, 2014 -
  • Is Your Google+ Account Secure?
    Google+ seems to be slowly gaining some traction. It's probably not quite the big Facebook contender that Google had hoped it would be, but it is gaining steamJust like Facebook, Google+ has privacy and security settings that you should configure t…
    - Wednesday, April 30, 2014 -
  • If Your PC Was Just Hacked, Read This:
    You've just discovered that your PC has been hacked. You could run away and go hide in a corner, or you can take action and do something about it.If you opt for taking action, then you need to check out our article: I've Been Hacked! Now What? We'l…
    - Wednesday, April 30, 2014 -
  • newRihanna, Kate Bosworth latest victims in nude photo hacking
    The latest round of hacked nude celebrity photos started making the Internet rounds this weekend, with Rihanna, Meagan Good, Gabrielle Union, Kate Bosworth, Hayden Panettiere among those victimized, reports said.
    - 14 hours ago Monday, September 22, 2014 -
  • newN.Y. Financial Regulator Says To Focus On Cyber Security
    New York's financial regulator said on Monday his agency will focus on cyber security over the next year, saying the possibility of a systemic attack to the financial system is one thing that keeps him awake at night. "It is impossible to take it ser…
    - 14 hours ago Monday, September 22, 2014 -
  • newAnother Data Breach Plagues eBay
    Online auction giant eBay is in hot water following a report by the BBC that dozens of listings on the site have been used to con shoppers into surrendering private information. According to the news service, the listings automatically redirect users…
    - 14 hours ago Monday, September 22, 2014 -
  • new'NOVA: Rise of the Hackers' explores modern code-crackers
    Cyber-security experts Liam O Murchu, left, and Eric Chien at Symantec. Their job is to investigate the viruses that pop up on your computer.
    - 18 hours ago Monday, September 22, 2014 -
  • newSeven safety tips from hackers
    Turn off your phone's Wi-Fi and Bluetooth. Hackers are religious about this. Keeping these features "on" all the time makes it easy for strangers to slip into your phone.
    - 22 hours ago Monday, September 22, 2014 -
  • newGabrielle Union's Nudes Are Leaked & She's So Mad She's Ready To Call The FBI
    One day after Kim Kardashian , Vanessa Hudgens , and others were the latest celebrities to have their personal nude photos hacked and leaked, more stars have become these hackers' next victims! The Being Mary Jane actress has already confirmed that t…
    - 1 day ago Monday, September 22, 2014 -
  • newAmber Heard -- Hackers Release Topless Message to Johnny Depp
    Amber Heard has been hit by the celebrity hackers hard ... with tons of her pics appearing to have leaked online -- including one topless photo that features a message to Johnny Depp . Over 50 topless pictures were posted onto 4chan/Reddit from Amber…
    - 1 day ago Sunday, September 21, 2014 -
  • newBio-reactive expiration labels could spell the end of spoiled food
    Home Depot said Thursday a recent cyber attack on its computer network affected a colossal 56 million customer payment cards. Home Depot said Thursday a recent cyber attack on its computer network affected a colossal 56 million customer payment cards…
    - 2 days ago Sunday, September 21, 2014 -
  • new4Chan nude photos scandal: Vanessa Hudgens, Kim Kardashian latest victims
    Opening up about her nude photo scandal, Vanessa Hudgens tells the spring edition of Paper Mag it was "by far the worst moment" of her career. Vanessa also discusses the transition from Disney princess to edgy actress as she prepares for her latest..…
    - 2 days ago Sunday, September 21, 2014 -
  • newFLASH!: Second Apparent Leak of Hacked Celebrity Nude Pictures
    More nude celebrity photos, purportedly including reality star Kim Kardashian, circulated social media Saturday, in what appeared to be the second massive hacking-related leak in less than a month, US media reported. The pictures, which also included…
    - 2 days ago Saturday, September 20, 2014 -
  • newKim Kardashian Nude Photos Leaked by Hacker
    Earlier this month a massive hack of celebrities blew up the Internet. A hacker released nude photos of Kaley Cuoco , Kate Upton, Jennifer Lawrence and others.
    - 3 days ago Saturday, September 20, 2014 -
  • newHow to protect your bank account from hackers
    As many as 56 million credit and debit cards were compromised in a recent hack of Home Depot's information systems. If you recently used a credit or debit card at a local business and found out its system was hacked, you might be concerned your bank…
    - 3 days ago Saturday, September 20, 2014 -
  • Beat cyber attacks with training and knowledge
    Business owners in Horncastle are being invited to free masterclasses to help them understand how to protect their IT systems from harmful cyber and internet security threats. According to the Department for Business, Innovation and Skills, the numbe…
    - 3 days ago Saturday, September 20, 2014 -
  • 5 ways to protect yourself from data breaches
    Data breaches at retailers aren't going away but there are ways consumers can protect themselves from future heists of their payment card information. Home Depot said Thursday that malicious software lurking in its check-out terminals between April a…
    - 3 days ago Friday, September 19, 2014 -
  • Allegheny Co. Health Dept. Waiting On Testing Of Possible EV-D68 Cases
    "We have sent a number of samples already from Children's Hospital and we are waiting to hear back. I will not be surprised if in fact Enterovirus 68 is here in southwest Pennsylvania," says Allegheny County Health Department Director Dr. Karen Hacke…
    - 3 days ago Friday, September 19, 2014 -
  • Home Depot malware attack even bigger than Target's, 56m payment cards affected
    Home Depot said Thursday a recent cyber attack on its computer network affected a colossal 56 million customer payment cards. Home Depot said Thursday a recent cyber attack on its computer network affected a colossal 56 million customer payment cards…
    - 4 days ago Friday, September 19, 2014 -
  • As open enrollment nears, Obamacare website still isn't totally safe
    Healthcare.gov still isn't as safe as it should be, and the annual open enrollment period starts again in just two months. To be clear: Hackers haven't stolen sensitive data from the Obamacare site.
    - 4 days ago Friday, September 19, 2014 -
  • OpenSSL Patches Nine Vulnerabilities
    Original release date: August 07, 2014OpenSSL has released updates patching nine vulnerabilities, some of which may allow an attacker to cause a Denial of Service (DoS) condition or force the client to revert to a less secure Transport Layer Security…
    - 47 days ago Thursday, August 7, 2014 -
  • Cisco EnergyWise Module Vulnerability
    Original release date: August 06, 2014Cisco has released an advisory to address a vulnerability in the EnergyWise module of Cisco IOS and Cisco IOS XE Software. Exploitation of the vulnerability could allow an unauthenticated, remote attacker to caus…
    - 48 days ago Wednesday, August 6, 2014 -
  • Local Privilege Escalation Vulnerability in Symantec Endpoint Protection
    Original release date: August 04, 2014US-CERT is aware of a local privilege escalation vulnerability in Symantec Endpoint Protection. This vulnerability affects all versions of Symantec Endpoint Protection Client 11.x and 12.x running Application and…
    - 50 days ago Monday, August 4, 2014 -
  • Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird
    Original release date: July 22, 2014The Mozilla Foundation has released security updates to address multiple vulnerabilities in Firefox, Firefox ESR, and Thunderbird, some of which may allow attackers to execute arbitrary code.The following updates a…
    - 63 days ago Tuesday, July 22, 2014 -
  • CPNI Releases Paper on Improving Defenses Against Targeted Attack
    Original release date: July 22, 2014The United Kingdom's Centre for the Protection of National Infrastructure (CPNI) has released a report on its “Improving Defenses Against Targeted Attack" (iDATA) cyber research program. The report contains descr…
    - 63 days ago Tuesday, July 22, 2014 -
  • Vulnerabilities in LZO and LZ4 compression libraries
    Original release date: July 21, 2014Recently disclosed vulnerabilities in the LZO and LZ4 compression libraries could allow remote code execution under certain circumstances. While these libraries are used by a large number of platforms and applicati…
    - 64 days ago Monday, July 21, 2014 -
  • Cisco Addresses Wireless Residential Gateway Vulnerability
    Original release date: July 16, 2014Cisco has released an advisory to address a vulnerability in the web server used in multiple Wireless Residential Gateway products that could allow an unauthenticated, remote attacker to crash the web server and ex…
    - 69 days ago Wednesday, July 16, 2014 -
  • Oracle Releases July 2014 Security Advisory
    Original release date: July 15, 2014Oracle has released its Critical Patch Update for July 2014 to address 113 vulnerabilities across multiple products.This update contains the following security fixes:5 for Oracle Database Server29 for Oracle Fusion…
    - 70 days ago Tuesday, July 15, 2014 -
  • Microsoft Releases Security Advisory for Improperly Issued Digital Certificates
    Original release date: July 10, 2014Microsoft has released a security advisory to address improperly issued SSL certificates that could be used in attempts to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. This issue a…
    - 75 days ago Thursday, July 10, 2014 -
  • Cisco Addresses Apache Struts 2 Vulnerability
    Original release date: July 09, 2014Multiple Cisco products include an implementation of Apache Struts 2 which contains a vulnerability that could allow an unauthenticated, remote attacker to bypass security restrictions and execute arbitrary command…
    - 76 days ago Wednesday, July 9, 2014 -
  • Дураки на экранах

    - Saturday, December 13, 2008 -
  • Казаки-разбойники

    - Wednesday, December 10, 2008 -
  • 22
    Привет.Сегодня 22.Сегодня госстат установил инфляцию на уровне почти 22%.Через 22 дня Новый Год!Конечно настроение не праздничное: кризис, р…
    - Monday, December 8, 2008 -
  • Маразм крепчал
    Привет.Государственный комитет статистики сообщил, что в октябре доходы населения сократились на 1% по сравнению с сентябрем до 77 627 млн.…
    - Friday, December 5, 2008 -
  • Защити себя сам
    Привет.Сокращения на многих промышленных предприятиях и массовое обналичивание всех вкладов привело к росту краж и грабежей.Наша добле…
    - Thursday, December 4, 2008 -
  • Спасите отечественного автопроизводителя
    Привет.Продолжаем наблюдать за кризисом. Очень интересно сравнивать действия в разных государствах.В нашей стране хотят ввести дополни…
    - Thursday, December 4, 2008 -
  • Шоу маст гоу вон
    Привет.Шоу под названием "антикризис в Украине" продолжается.Комментарии.net пишут, что министр финансов предлагает навязать всем банкам…
    - Wednesday, December 3, 2008 -
  • Вот такой у нас футбол
    Привет.Не запланированная заметка.Случайно зашел на Корреспондент.net:Вот такой у нас футбол: УЕЫИ на это все уже было 53 комментария.Посто…
    - Wednesday, December 3, 2008 -
  • Доллар гудбай...
    Привет.Наша страна (Украина) - оплот свободы и демократии.Сейчас многие говорят о конце доллара США - переход стран Северной Америки на ед…
    - Wednesday, December 3, 2008 -
  • Итоги ноября
    Привет.Давно я не проводил анализа входящего трафика. Сегодня подводим итоги ноября 2008 года. Общее число посещений 1038, посещено страниц -…
    - Tuesday, December 2, 2008 -
  • Пришла зима - пропала "зелень"
    Привет.В нашем "замечательном" государстве в течение последних нескольких лет национальная валюта была "жестко" привязана к национально…
    - Monday, December 1, 2008 -
  • А кто считает расходы на эксплуатацию?

    - Friday, November 28, 2008 -
  • Мой дом - моя крепость
    Привет.В нашем регионе кризис продолжает бушевать. Количество безработных (реальных) растет. Людей могут и не сокращать, но отправляют в…
    - Friday, November 28, 2008 -
  • И эти люди запрещают мне в носу ковыряться

    - Tuesday, November 25, 2008 -
  • Кризис не хотят замечать
    Привет.Кризис бушует. Предприятия сокращают свой штат. Многих отправляют в "бесплатные" отпуска. Многим задерживают зарплаты. Многим офи…
    - Monday, November 24, 2008 -