• newBroken robots 'learn to keep going'
    Engineers take a step towards having machines that can operate even when they are damaged by developing a robot that can teach itself to walk, even with a broken leg.
    - 1 hour ago Wednesday, July 30, 2014 -
  • newCan one bad blog blight a business?
    Can firms defend themselves against irate reviews?
    - 1 hour ago Wednesday, July 30, 2014 -
  • newTor attack may have unmasked users
    Users of the "dark net" service Tor who visited hidden websites may have had their identities revealed by a five-month long cyber-attack.
    - 4 hours ago Wednesday, July 30, 2014 -
  • newSmart home kit proves 'easy to hack'
    Security experts at HP raise concern about smart home devices after testing 10 app-controlled examples and discovering vulnerabilities.
    - 8 hours ago Wednesday, July 30, 2014 -
  • newVIDEO: Broads-view opens up Norfolk waterways
    The Norfolk Broads will soon be available for virtual navigation thanks to a novel aquatic equivalent of Google's Streetview technology
    - 9 hours ago Wednesday, July 30, 2014 -
  • newTablet screens to correct sight loss
    US engineers have developed a prototype tablet display that compensates for an individuals' vision problems.
    - 11 hours ago Wednesday, July 30, 2014 -
  • newNintendo posts loss despite Mario
    Nintendo's share price drops after the company reports a bigger than expected loss despite the release of Mario Kart 8 over the period.
    - 11 hours ago Wednesday, July 30, 2014 -
  • newVIDEO: UK to allow driverless cars on roads
    The UK government will shortly outline measures to permit driverless cars to use public roads by next year.
    - 12 hours ago Wednesday, July 30, 2014 -
  • newUK to allow driverless cars on roads
    The UK government says it plans to allow driverless cars on public roads in January, and asks cities to compete to host one of three trials.
    - 14 hours ago Wednesday, July 30, 2014 -
  • newNetflix pays AT&T to ensure quality
    The streaming video service Netflix agrees to pay US telecoms giant AT&T to ensure its content is delivered to users smoothly.
    - 14 hours ago Wednesday, July 30, 2014 -
  • newRobert Siciliano: Make Information Security a Priority
    We all know that 123qwe is such an easy password to remember, especially if it's for all gazillion of your accounts. You know whom else finds this very convenient? Hackers! Read more: Social Media, Identity Theft, Technology, Facebook, H…
    - 13 hours ago Wednesday, July 30, 2014 -
  • newMark Steber: ID Theft -- It's a Matter of When
    Identity theft is everywhere and takes many forms and new scams are appearing every day. Read more: Protection, Taxes, Steber, Crime, Cybercrime, Identity Theft, Mark, Theft, Id, Scams, Business News
    - 1 day ago Tuesday, July 29, 2014 -
  • newRobert Siciliano: Facebook Security for Parents and Teens
    Facebook offers a hefty amount of security measures that parents and teens should know about. Here are a few highlights. Read more: Social Media, Identity Theft, Bullying, Technology, Parenting, Hacking, Privacy, Hackers, Identity Protec…
    - 2 days ago Monday, July 28, 2014 -
  • newMichael Nirenberg: No Security: HOPE X Is (Not So) Decadent and Depraved -- Day 3
    I had a great epiphany on the train last week which was that I'm beginning to see hacking not merely as cracking codes, or as Richard Stallman says "playful cleverness", but as man's will to deconstruct things in order to rebuild them into something…
    - 3 days ago Sunday, July 27, 2014 -
  • Robert Siciliano: Malware Can Hide in the Most Obvious Places
    You never know when malware will bite. Even browsing an online restaurant menu can download malicious code, put there by hackers. Read more: Recycling, Back Up, Identity Theft, Cloud Storage, Technology, Syncing, Hacking, Storage Devices…
    - 5 days ago Saturday, July 26, 2014 -
  • WATCH: The Future Of Warfare
    Watch Live at 3:00 - 4:00pm MDT (5:00 - 6:00pm EST).Our still formidable nuclear arsenal and our supremacy in conventional armaments are of limite... Read more: War Tactics, Terrorism, War, War Strategy, HuffPost Aspen Institute, Aspen…
    - 6 days ago Thursday, July 24, 2014 -
  • Sarah Cooper: 11 Tricks to Get Engineers to Sort of Respect You
    As we all know, software engineers are the smartest, sweetest, most pretentious bastards in corporate America. I should know  --  I'm engaged to one of them. Read more: Software Development, Software, Startups, Programming, Product M…
    - 6 days ago Thursday, July 24, 2014 -
  • Michael Nirenberg: No Security: Hope X Is (Not So) Decadent and Depraved -- Day 2
    This is Day 2 of my journal shooting my history on computer hacking at HOPE X Conference. Read more: Emmanuel Goldstein, Dilaudid, Daniel Ellsberg, Michael Lee Nirenberg, Tiffany Rad, Eric Corley, Hope X, Cheshire Catalyst, Phiber Optik,…
    - 7 days ago Wednesday, July 23, 2014 -
  • Robert Siciliano: Beware of Flight MH17 Facebook Scams
    How low can scammers go? The latest is phony Facebook profiles that use identities of deceased victims of Malaysia Airlines Flight MH17 -- claiming th... Read more: Identity Theft, Scammers, Hacked, Crime, Hacking, Scams, Privacy, Hacker…
    - 7 days ago Wednesday, July 23, 2014 -
  • Samuel Bucholtz: Six Mistakes to Avoid When Writing Code for the Internet of Things
    Companies like Intel, Google, Samsung, Microsoft, General Electric, Cisco, AT&T and IBM, which are already taking an active role in Internet of Things development, will soon be placing a greater emphasis on risk-mitigation with these products - and d…
    - 8 days ago Wednesday, July 23, 2014 -
  • StubHub Says It Was A Victim Of Massive Cyber Fraud
    By Karen Freifeld NEW YORK (Reuters) - Police have arrested seven people on charges they were tied to an international ring that defraud... Read more: Video, Stubhub Cyber Fraud Case, Identity Theft, Stubhub Arrests, Stubhu…
    - 8 days ago Tuesday, July 22, 2014 -
  • Robert Siciliano: Phishing Alert: 8 Tips to Protect Yourself from Attacks
    So many people fail to learn about phishing scams, a favorite and extremely prevalent scam among cybercriminals. A type of phishing scam is to lure the user onto a malicious website. Read more: Social Media, Identity Theft, Technology, F…
    - 9 days ago Tuesday, July 22, 2014 -
  • Michael Nirenberg: No Security: Hope X (Is Not) Decadent and Depraved - Day 1
    This is part one of my three-day diary on filming my currently untitled history of hacking documentary at the Hackers On Planet Earth X (HOPE X) Convention hosted by the legendary 2600 Hacker Quarterly. Read more: Mod, Edward Snowden, On…
    - 9 days ago Monday, July 21, 2014 -
  • Robert Siciliano: How to Prevent Summertime Scams
    Summertime is here -- and that means sunshine and vacations. Most people love summertime, including scammers! Hackers can use this time to take advantage while we are planning vacations or on vacation or just enjoying fun in the sun. Here are some ke…
    - 12 days ago Saturday, July 19, 2014 -
  • Aaron Dubrow: Dispatches From a Connected Future
    Anyone looking for a glimpse into the technologies that will change our lives, businesses and organizations in the coming decades received an eyeful at the Smart America Expo in Washington, D.C. in June. Read more: National Science Found…
    - 12 days ago Friday, July 18, 2014 -
  • Robert Siciliano: Everything You Need to Know About a Credit Freeze
    A credit freeze locks down your credit report so lenders can't see your scores, making your credit/SSN useless to them because they don't know their risk level. Read more: Social Media, Identity Theft, Technology, Facebook, Hacking, Priv…
    - 13 days ago Thursday, July 17, 2014 -
  • Google Creates Elite Team To Fight Hackers -- And Maybe The NSA
    Google said Tuesday it had created an elite team of researchers to find and report major Internet security flaws, potentially thwarting both Chinese h... Read more: Google, Nsa, Identity Theft, George Hotz, Cybersecurity, Google Project…
    - 15 days ago Tuesday, July 15, 2014 -
  • Beverly Macy: 3 Key Internet-of-Things Trends in Mid-2014
    Everyone from Samsung to Intel to GE to you-name-it is already in the space and it's getting very exciting. It's also getting very real, with both advantages and risks rising to the surface. As we go through the 2nd half of 2014, we're seeing 3 key t…
    - 15 days ago Tuesday, July 15, 2014 -
  • Bea Edwards: Less Than Zero: Hyping the Cyber War
    Corporate America and the intelligence community promote a panicked militaristic national mood because it justifies both government secrecy and huge taxpayer outlays for defense. Read more: Nsa, NSA Director Keith Alexander, Keith Alexan…
    - 16 days ago Monday, July 14, 2014 -
  • Chinese Man Accused Of Hacking Boeing For Military Secrets
    SAN DIEGO (AP) — U.S. authorities have charged a Chinese businessman with hacking into the computer systems of U.S. companies with large defense con... Read more: Boeing, China Cybercrime, Cybercrime, Identity Theft, Su Bin, Chinese Ha…
    - 19 days ago Friday, July 11, 2014 -
  • Robert Siciliano: Recognize Your Willingness To Give Up Your Privacy
    If a stranger stopped you on the street and requested your e-mail address and birthdate, would you give it to that person? A rational person would nev... Read more: Data Broker, Identity Theft, Credit Scores, Technology, Hacking, Privacy…
    - 22 days ago Wednesday, July 9, 2014 -
  • Former NSA Chief Is Working For Wall Street Now
    Wall Street has tapped former National Security Agency director Keith Alexander to form a council that would coordinate how banks and the government r... Read more: Nsa, Michael Chertoff, Video, Cyber War, Wall Street, Keith Alexander, N…
    - 22 days ago Tuesday, July 8, 2014 -
  • Russia Accuses U.S. Of 'Kidnapping' Alleged Hacker
    (Adds U.S. comments, paragraph 7) WASHINGTON/MOSCOW, July 8 (Reuters) - Russia accused the United States on Tuesday of violating a bil... Read more: Bank Fraud, Russia US Relations, Department of Homeland Security, Roman…
    - 23 days ago Tuesday, July 8, 2014 -
  • Robert Siciliano: What Is an Advanced Persistent Threat?
    If you’ve ever seen a movie where the bad guys are using ongoing, invasive hacking to spy on their “enemy,” you have some familiarity with an ad... Read more: Social Media, Identity Theft, Technology, Facebook, Hacking, Privacy, Ha…
    - 24 days ago Monday, July 7, 2014 -
  • Robert Siciliano: Graduates, Beware of Identity Theft
    Worried about finding a job after you graduate from college? Worried about paying off your debts? It gets uglier: New college grads need to think about their identities being stolen. One-third of identity theft complaints come from young adults.…
    - 27 days ago Friday, July 4, 2014 -
  • newHackers Back to Their Old Tricks
    Old tricks that have helped hackers penetrate computers for months or longer worked again last week at Goodwill and Stubhub. Taking a page from the gang that pillaged payment card and personal information from Target last year, hackers clipped paymen…
    - 3 hours ago Wednesday, July 30, 2014 -
  • newLeahy Bill Aims to Rein In Government Snooping
    Government snooping on Americans would be curtailed under a bill introduced Tuesday in the U.S. Senate. The measure, sponsored by Senate Judiciary Chairman Patrick Leahy, D-Vt., would ban bulk collection of domestic information, limit the scope of se…
    - 5 hours ago Wednesday, July 30, 2014 -
  • newSamsung Z Delay Prompts Tizzy Over Tizen
    Samsung has delayed the launch of its Samsung Z smartphone running the Tizen OS, which was scheduled for Q3 release in Russia. The move, just short of two months after the Samsung Z's launch at the Tizen Developers Conference, sparked a death watch f…
    - 7 hours ago Wednesday, July 30, 2014 -
  • newAndroid's Fake ID Could Put Millions in Jeopardy
    An Android vulnerability that exists in every version from v2.1 Eclair to v. 4.3 Jelly Bean could expose millions of users, Bluebox Security has warned. The flaw lets attackers fake the certificates of specially privileged parties, such as Adobe and…
    - 10 hours ago Wednesday, July 30, 2014 -
  • newOkCupid's Confessed Hijinks Get Thumbs-Down
    OkCupid has admitted carrying out psychological experiments on its users. Because OkCupid doesn't really know what it's doing, it needs to experiment to see what works and what doesn't, according to cofounder Christian Rudder. Every Internet company…
    - 1 day ago Tuesday, July 29, 2014 -
  • newBubblews Will Give You a Penny for Your Thoughts
    Bubblews, a social media platform that offers to pay users for their posts, last week moved out of its testing phase, which began in 2012. It emerged with a new look designed to attract users who might be dissatisfied with other social media offering…
    - 1 day ago Tuesday, July 29, 2014 -
  • newStanford Researchers Build a Better Battery
    A new way to extend battery life would allow smartphones to last three to four times longer on a single charge, Stanford University researchers have found. A team led by Yi Cui, professor of materials science and engineering, has developed pure metal…
    - 1 day ago Tuesday, July 29, 2014 -
  • newThe Shocking Truth About Torvalds' Home Office
    If the Linux world has anything akin to royalty, Linus Torvalds surely must be its monarch. So what could be more natural than for the Linux-loving masses to want to see where he works and lives? Fortunately for FOSS fans, none other than the Linux F…
    - 2 days ago Monday, July 28, 2014 -
  • newThe Skully Augmented Motorcycle Helmet Would Make Iron Man Jealous
    Skully had its coming-out party last week, and while the name unfortunately sounds like the nickname for any number of comic book villains -- from Skeletor to the Red Skull -- it is actually a firm that makes a pretty incredible high-technology motor…
    - 2 days ago Monday, July 28, 2014 -
  • newAttackers Compromise TOR Network to De-Anonymize Users of Hidden Services
    A critical vulnerability in Tor — an encrypted anonymizing network considered to be one of the most privacy oriented service, which is used by online users in order to hide their activities from law enforcement, government censors and others — wa…
    - 7 hours ago Wednesday, July 30, 2014 -
  • newInstasheep — Instagram Account Hacking Tool Released
    Two days ago, we reported at The Hacker News about a critical issue in the most popular image and video sharing service, Instagram app for mobiles, that allows an attacker to hijack users’ account and successfully access private photos, delete vict…
    - 12 hours ago Wednesday, July 30, 2014 -
  • newSignal — Open Source iPhone App to Make Free End-to-End Encrypted Voice Calls
    Good News for Privacy Lovers!! An open source software group Open Whisper Systems has released the first free and Open Source phone call application for iPhone users, which is specifically designed to make secure and encrypted calls.When we tal…
    - 13 hours ago Wednesday, July 30, 2014 -
  • newAndroid "Fake ID" Vulnerability Allows Malware to Impersonate Trusted Apps
    Due to the majority in the mobile platform, Google’s Android operating system has been a prior target for cybercriminals and a recently exposed weakness in the way the operating system handles certificate validation, left millions of Android device…
    - 14 hours ago Wednesday, July 30, 2014 -
  • newFacebook Self-XSS Scam Fools Users into Hacking Themselves
    Scammers have again targeted more than one billion active users of the popular social networking giant Facebook, to infect as many victims as possible.Not by serving fake post, neither by providing malicious video link, instead this time scammers…
    - 2 days ago Tuesday, July 29, 2014 -
  • newChinese Hackers Stole Blueprints of Israel's Iron Dome Missile Defense System
    Chinese hackers infiltrated the databases of three Israeli defense contractors and stole plans for Israel's Iron Dome missile defense system, according to an investigation by a Maryland-based cyber security firm ‘Cyber Engineering Services Inc. (Cy…
    - 2 days ago Tuesday, July 29, 2014 -
  • newInstagram Mobile App Issue Leads to Account Hijacking Vulnerability
    In the era of Government surveillance, ensuring the security and safety of our private communications regardless of platform – email, VOIP, message, even cookies stored – should be the top priority of the Internet industry. Some industry came tog…
    - 3 days ago Monday, July 28, 2014 -
  • newResearcher to Demonstrate Poor SSL Implementations Using Pineapple WiFi
    A leading provider of advanced threat, security and compliance solutions, Tripwire, has announced that Craig Young, a security researcher from its Vulnerability and Exposure Research Team (VERT), is working on a paper about SSL vulnerabilities that w…
    - 3 days ago Monday, July 28, 2014 -
  • Russian Government Offers $111,000 For Cracking Tor Anonymity Network
    The Russian government is offering almost 4 million ruble which is approximately equal to $111,000 to the one who can devise a reliable technology to decrypt data sent over the Tor, an encrypted anonymizing network used by online users in order to hi…
    - 4 days ago Sunday, July 27, 2014 -
  • Kali Linux 1.0.8 — New Release Supports UEFI Boot
    Great news for Hackers and Backtrack Linux fans! Offensive Security, the developers of one of the most advance open source operating system for penetration testing known as 'KALI Linux', has finally announced the release of the latest version i.e. Ka…
    - 4 days ago Saturday, July 26, 2014 -
  • Intel launches Hardware-based Self-Encrypting Solid State Drives
    Data security is a big task for businesses as well as a challenge for IT leaders, whether it be securing networks or devices. Past few months, we often came across various data breaches, the largest among all was Target data breach, which cost a busi…
    - 5 days ago Friday, July 25, 2014 -
  • Mayhem — A New Malware Targets Linux and FreeBSD Web Servers
    Security researchers from Russian Internet giant Yandex have discovered a new piece of malware that is being used to target Linux and FreeBSD web servers in order to make them a part of the wide botnet, even without the need of any root privileges.…
    - 6 days ago Friday, July 25, 2014 -
  • Exploit-Selling Firm Kept Internet Explorer Zero-Day Vulnerability Hidden for 3 Years
    A French information security company VUPEN has recently disclosed that it held onto a serious Internet Explorer (IE) vulnerability for at least three years before revealing it at the Pwn2Own hacker competition held in March this year.The critical z…
    - 6 days ago Thursday, July 24, 2014 -
  • 50,000 Websites Hacked Through MailPoet WordPress Plugin Vulnerability
    The users of WordPress, a free and open source blogging tool as well as content management system (CMS), that have a popular unpatched wordPress plugin installed are being cautioned to upgrade their sites immediately.A serious vulnerability in the W…
    - 7 days ago Thursday, July 24, 2014 -
  • Undocumented iOS Features left Hidden Backdoors Open in 600 Million Apple Devices
    A well known iPhone hacker and forensic scientist has unearthed a range of undocumented and hidden functions in Apple iOS mobile operating system that make it possible for a hacker to completely bypass the backup encryption on iOS devices and can ste…
    - 7 days ago Thursday, July 24, 2014 -
  • Warning — Zero-Day Vulnerabilities Identified in Tails Operating System
    The critical zero-day security flaws has been discovered in the privacy and security dedicated Linux-based operating system “Tails” that could be used by an attacker to unmask your identity.Tails, which is been used and recommended by the glo…
    - 7 days ago Thursday, July 24, 2014 -
  • Researchers Demonstrate Zero-Day Vulnerabilities in Tails Operating System
    The critical zero-day security flaws, discovered in the privacy and security dedicated Linux-based Tails operating system by the researcher at Exodus Intelligence that could help attackers or law enforcements to de-anonymize anyone’s identity, actu…
    - 7 days ago Thursday, July 24, 2014 -
  • 'Real Footage of Malaysian Flight MH 17 Shot Down' Facebook Spam Spreads Malware
    A distasteful trend among the cyber crooks have began these days that they left no occasion, either good or bad, to snatch users’ financial information in order to make money as well as spread malware to victimize users. The tragedy of the cras…
    - 7 days ago Wednesday, July 23, 2014 -
  • HTML5 Canvas Fingerprint — Widely Used Unstoppable Web Tracking Technology
    Till Now we have seen many traditional way of tracking web users, such as using cookies that get saved on user’s system may not be available forever to many companies, but a new method of tracking users has emerged that worked without the use of co…
    - 8 days ago Wednesday, July 23, 2014 -
  • Apple Strongly Denies Claims of Installing iOS Backdoor
    The allegations from a data forensic expert and security researcher that iOS contains a “backdoor” permitting third parties to potentially gain access to large amount of users' personal data instigated Apple to give a strong response.The comp…
    - 8 days ago Wednesday, July 23, 2014 -
  • Firefox 31 — Mozilla Releases Security Updates to Tighten Browser Security
    Mozilla has officially released its latest build Firefox 31 for all supported platforms, addressing 11 vulnerabilities in total, three of which are marked critical that could have been exploited by hackers to mount remote code execution attacks.M…
    - 8 days ago Wednesday, July 23, 2014 -
  • Indexeus — Search Engine Exposes Malicious Hackers and Data Breaches
    So far, we have seen the search engine for online underground Black Markets, named ‘Grams’ that lets anyone find illegal drugs and other contraband online in an easier way ever and is pretty much fast like Google Search Engine.Now, a new sear…
    - 8 days ago Tuesday, July 22, 2014 -
  • Critroni - File Encrypting Ransomware out in the Wild
    A new ransomware from the Crypto-Ransomware family has been detected by the security researcher, which is being sold in different underground forums from the last month and recently included in the Angler exploit kit.The latest ransomware, given…
    - 9 days ago Monday, July 21, 2014 -
  • Cydia Repository by BigBoss Hacked, All Paid and Free Tweaks Stolen
    BigBoss repository, one of the biggest and most popular repositories for jailbreak tweaks in Cydia, has reportedly been hacked by either an individual or a group of hackers.Cydia is a software application for iOS that enables a user to find and i…
    - 10 days ago Monday, July 21, 2014 -
  • How Russian Hackers Placed "Digital Bomb" Into the NASDAQ
    Four years ago, NASDAQ servers were compromised by Russian hackers, who were somehow able to insert a "digital bomb" into the systems of NASDAQ stock exchange, which would have been able to cause several damage to the computer systems in the stock ma…
    - 10 days ago Monday, July 21, 2014 -
  • Luring The Elusive Cyber Security Pro
    Struggling to find scarce IT security talent? Make sure your hiring managers understand the certifications and match candidates for skills fit -- not just credentials.
    - Monday, April 14, 2014 -
  • Amazon Plans 3D Phone: Report
    Amazon phone capable of displaying images in three dimensions could ship this fall.
    - Saturday, April 12, 2014 -
  • Google Glass Goes Public
    Google Glass Explorer Program will be open to US-based adults on tax day.
    - Saturday, April 12, 2014 -
  • Facebook Changes: What To Expect
    Facebook cracks down on spammy posts, tweaks privacy options, and revamps messaging. Here's what it means to you.
    - Saturday, April 12, 2014 -
  • Hacker Weev Free After Appeal
    Andrew "Weev" Auernheimer, who embarrassed AT&T by exposing a security flaw, had his conviction overturned by federal appeals court.
    - Friday, April 11, 2014 -
  • Rogue IT Driven By Need For Speed
    We've lost control to business users before. But this time, the thing that initiated our pain (the cloud) may also be the cure.
    - Friday, April 11, 2014 -
  • 5 Ways Android Won Me Over
    From security to "Lego" programming, Android has more going for it than you might think.
    - Friday, April 11, 2014 -
  • 5 Job Interview Tips Via Alice In Wonderland
    Curiouser and curiouser! Use these techniques during your next interview to win that IT or security job offer.
    - Thursday, April 10, 2014 -
  • Google Glass For Parkinson's: 10 Findings
    Google Glass offers more health benefits than awkwardness, Parkinson's patients in UK study find.
    - Thursday, April 10, 2014 -
  • Hackathons Should Be More Than A Circus
    Tapping into developer talent at a hackathon should be fun, but don't lose sight of the potential business benefits.
    - Thursday, April 10, 2014 -
  • newiPhone gets first free app for encrypting voice calls
    An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.
    - 13 hours ago Wednesday, July 30, 2014 -
  • new3 zero-day flaws found in Symantec's Endpoint Protection
    Symantec's Endpoint Protection product has three zero-day flaws that could allow a logged-in user to move to a higher access level on a computer, according to a penetration testing and training company. The three flaws, all known as privilege escalat…
    - 13 hours ago Wednesday, July 30, 2014 -
  • newMobile management: Making sense of your options
    Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful — and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information, but the varie…
    - 15 hours ago Wednesday, July 30, 2014 -
  • newBlackBerry adds more security for the sensitive enterprise
    Now that BlackBerry has fallen significantly behind Apple and Google in the race to offer features and third-party apps for its smartphones, the company is concentrating on providing devices that, it claims, have the strongest available security -- i…
    - 1 day ago Tuesday, July 29, 2014 -
  • newAndroid vulnerability allows malware to compromise most devices and apps
    The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device. The core problem is that Android fails to validate public key infrastructure ce…
    - 1 day ago Tuesday, July 29, 2014 -
  • newThe data dangers of free public Wi-Fi
    New York City is asking vendors to take over the city's almost-universally abandoned pay phones (a transparent, glass-enclosed structure on street corners was probably never a good choice for Superman's changing room anyway) and use them to deliver f…
    - 1 day ago Tuesday, July 29, 2014 -
  • newHow to protect personal, corporate information when you travel
    Before flying from Rome to Philadelphia earlier this summer, I stopped in the hotel lobby to print my boarding pass. The hotel had one computer dedicated solely to this task. It was the only public computer available to guests. I could access only ai…
    - 1 day ago Tuesday, July 29, 2014 -
  • newPrivacy groups call for action to stop Facebook's off site user tracking plans
    U.S. and EU privacy and consumer groups called on privacy regulators to stop Facebook's plans to gather the Internet browsing patterns of its users while they visit other sites.
    - 2 days ago Tuesday, July 29, 2014 -
  • newMobile security: A mother lode of new tools
    Long, complex passwords that must be input on tiny screens, often while on the move: Such hassles make password-based security unworkable in a mobile world. But change is coming, thanks to an industrywide backlash that gave rise to a gold rush of new…
    - 2 days ago Tuesday, July 29, 2014 -
  • new7 indispensable project management tips
    In my role as a traveling computer security consultant, I meet with project managers every week.
    - 2 days ago Tuesday, July 29, 2014 -
  • newAntivirus products riddled with security flaws, researcher says
    It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.Accord…
    - 3 hours ago Wednesday, July 30, 2014 -
  • newInternet of things devices contain high number of vulnerabilities, study finds
    A security audit of 10 popular Internet-connected devices -- components of the so-called "Internet of things" -- identified an alarmingly high number of vulnerabilities.The study lasted three weeks and was performed by researchers from Hewlett-Packar…
    - 3 hours ago Wednesday, July 30, 2014 -
  • newiPhone gets first free app for encrypting voice calls
    An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.Signal comes from Open Whisper Systems, which developed RedPhone and Text…
    - 10 hours ago Wednesday, July 30, 2014 -
  • newEvan Schuman: The data dangers of free public Wi-Fi
    New York City is asking vendors to take over the city's almost-universally abandoned pay phones (a transparent, glass-enclosed structure on street corners was probably never a good choice for Superman's changing room anyway) and use them to deliver…
    - 1 day ago Tuesday, July 29, 2014 -
  • newMobile security: A mother lode of new tools
    Long, complex passwords that must be input on tiny screens, often while on the move: Such hassles make password-based security unworkable in a mobile world. But change is coming, thanks to an industrywide backlash that gave rise to a gold rush of ne…
    - 2 days ago Monday, July 28, 2014 -
  • new"Onion" ransomware the next Cryptolocker: Kaspersky
    Kaspersky Lab has uncovered a type of encrypting ransomware that attempts to hide its malicious nature.Dubbed "Onion," because it uses the anonymous network Tor (the Onion Router) to make it hard to track, it encrypts user data and then demands ran…
    - 2 days ago Monday, July 28, 2014 -
  • newThe hidden dangers of “good enough” authentication
    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.While it’s human nature to make comparisons, not all comparisons are helpful…
    - 2 days ago Monday, July 28, 2014 -
  • Thousands of sites compromised through WordPress plug-in vulnerability
    A critical vulnerability found recently in a popular newsletter plug-in for WordPress is actively being targeted by hackers and was used to compromise an estimated 50,000 sites so far.The security flaw is located in MailPoet Newsletters, previously k…
    - 5 days ago Friday, July 25, 2014 -
  • 11 signs you've been hacked -- and how to fight back
    In today's threatscape, antivirus software provides little piece of mind, and antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. Despite modern heuristics, virtualized environments, system…
    - 5 days ago Friday, July 25, 2014 -
  • Arrests made after international cyber-ring targets StubHub
    Six people have been indicted on charges of running an international ring that resold tickets bought through compromised StubHub accounts for some of New York's biggest concerts and sporting events.Four others were arrested in connection with the cas…
    - 7 days ago Wednesday, July 23, 2014 -
  • When is your infrastructure safe from Heartbleed?
    Now that IT departments have fixed the Heartbleed bug in most internet-facing software, security pros have started debating the risk of not patching software buried deep in the data center.CloudPhysics, which performs storage analytics on virtualized…
    - 7 days ago Wednesday, July 23, 2014 -
  • File-encrypting Android ransomware 'Simplocker' targets English-speaking users
    A ransomware threat that encrypts files stored on the SD memory cards of Android devices has been updated to target English-speaking users with FBI-themed alerts.The malware app is called Simplocker and was first identified by security researchers fr…
    - 7 days ago Wednesday, July 23, 2014 -
  • Tor Project working to fix weakness that can unmask users
    Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.[Black Hat presentation on TOR suddenly cancelled]The Blac…
    - 8 days ago Tuesday, July 22, 2014 -
  • Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker
    Cybercriminals are spreading a new file-encrypting ransomware program that's more powerful and resilient than Cryptolocker, a threat recently shut down by the U.S. Department of Justice.The new ransomware threat is called CTB-Locker (Curve-Tor-Bitcoi…
    - 9 days ago Monday, July 21, 2014 -
  • CryptoWall blamed for possible data breach at Benjamin F. Edwards & Co.
    Warning of a potential data breach, Benjamin F. Edwards & Co. (BFE) says that CryptoWall, a variant of CryptoLocker, infected an employee's computer on May 27, and as a result, "data was transferred to a suspicious IP address."In a letter to the New…
    - 12 days ago Friday, July 18, 2014 -
  • Net neutrality a key battleground in growing fight over encryption, activists say
    Plans to favor some Internet packets over others threaten consumers' hard-won right to use encryption, a digital privacy advocate says.Activists and tech companies fended off efforts in the U.S. in the 1990s to ban Internet encryption or give the gov…
    - 12 days ago Friday, July 18, 2014 -
  • Aloha point-of-sale terminal, sold on eBay, yields security surprises
    Matt Oh, a senior malware researcher with HP, recently bought a single Aloha point-of-sale terminal -- a brand of computerized cash register widely used in the hospitality industry -- on eBay for US$200.Oh found an eye-opening mix of default password…
    - 12 days ago Friday, July 18, 2014 -
  • Romanian gang used malware to defraud international money transfer firms
    Romanian and French authorities have dismantled a cybercriminal network that infected computers at money transfer outlets across Europe and used them to perform illegal transactions.The gang was also involved in the theft of credit card details throu…
    - 12 days ago Friday, July 18, 2014 -
  • Juniper Networks improves defense against DDoS attacks
    Malware infections and data breaches are obviously serious concerns for any organization, but one of the most annoying—and yet crippling—attacks is the denial-of-service. Detecting and defending against DDoS attacks requires a different approach…
    - 13 days ago Thursday, July 17, 2014 -
  • There's almost a million fake apps targeting your phone
    Fake apps dressed up to look like official ones but actually designed to steal user data are increasingly targeting Android phone users, according to a study by Trend Micro.The company looked at the top 50 free apps in Google's Play Store and then se…
    - 13 days ago Thursday, July 17, 2014 -
  • newBlackBerry: We'll buy Angela Merkel's phone security company. HA!
    Secusmart apparently to BOOST rep for snoop-proofness BlackBerry has bought privately held German firm Secusmart as part of its drive to become the handset provider of choice for security-conscious clients such as government agencies and big business…
    - 1 day ago Tuesday, July 29, 2014 -
  • newOnly '3% of web servers in top corps' fully fixed after Heartbleed snafu
    Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told A study of the public-facing web servers run by some of the world's largest firms has suggested only three per cent of the machines have been fully protected against the O…
    - 2 days ago Tuesday, July 29, 2014 -
  • new14 antivirus apps found to have security problems
    Vendors just don't care, says researcher, after finding basic boo-boos in security software Organisations should get their antivirus products security tested before deployment because the technology across the board dangerously elevates attack surfac…
    - 2 days ago Tuesday, July 29, 2014 -
  • newMalware gets your Android blabbering to HACKERS
    Boffins get your mobe to spill the beans using Google text-to-speech kit Researchers from the Chinese University of Hong Kong have developed bizarre malware that dictates contacts, emails and other sensitive text data in order to steal it.…
    - 2 days ago Tuesday, July 29, 2014 -
  • newGoogle Maps community competition falls foul of Indian regulations
    Oh look! Such a lovely SECRET MILITARY BASE! Google has found itself in hot water in India, with the country's Central Bureau of Investigation launching a formal investigation into Google Maps for allegedly publishing the location of sensitive milita…
    - 2 days ago Monday, July 28, 2014 -
  • newIsrael's Iron Dome missile tech stolen by Chinese hackers
    Corporate raiders Comment Crew fingered for attacks A Chinese hacking team previously accused of being behind raids against US defence contractors has been accused of a new data heist: plundering the tech behind Israel's Iron Dome missile defence sys…
    - 2 days ago Monday, July 28, 2014 -
  • newSecure microkernel that uses maths to be 'bug free' goes open source
    Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit A nippy microkernel mathematically proven to be bug free*, and used to protect drones from hacking, will be released as open source tomorrow.…
    - 3 days ago Monday, July 28, 2014 -
  • newAusCERT chief Ingram steps down
    Replacement promises better relationships, late nights sleeping at the office Graham Ingram, the head of Australia's first Computer Emergency Response Team (AusCERT), has stepped down after 12 years in the role.…
    - 3 days ago Sunday, July 27, 2014 -
  • DAYS from end of life as we know it: Boffins tell of solar storm near-miss
    'We'd still be picking up the pieces now' Two years ago this week the Sun let off one of its periodic solar flares, and a new analysis of its force shows that human civilization had a very near miss indeed.…
    - 5 days ago Friday, July 25, 2014 -
  • How long is too long to wait for a security fix?
    Synology finally patches OpenSSL bugs in Trevor's NAS Sysadmin blog  Synology quietly released version 4.2-3250 of its DiskStation Manager (DSM) operating system this month. This squashes critical security bugs in version 4.2 of DSM – bugs that we…
    - 5 days ago Friday, July 25, 2014 -
  • Roll out the welcome mat to hackers and crackers
    Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s A clear and easy to read policy is key to developing a good internal bug bounty program, according to BugCrowd which has published guidelines to help businesses encourage t…
    - 6 days ago Friday, July 25, 2014 -
  • Four fake Google haxbots hit YOUR WEBSITE every day
    Goog the perfect ruse to slip into SEO orfice One in every 24 Googlebots is a imitation spam-flinging denial of service villain that masquerades as Mountain View to sneak past web perimeter defences, according to security chaps at Incapsula.…
    - 6 days ago Friday, July 25, 2014 -
  • Boffins build FREE SUPERCOMPUTER from free cloud server trials
    Who cares about T&Cs when there's LIteCoin to mint? Researchers Rob Ragan and Oscar Salazar have built a free LiteCoin-mining botnet that generates $US1750 a week using free cloud signup promotions.…
    - 6 days ago Thursday, July 24, 2014 -
  • Putin: Crack Tor for me and I'll make you a MILLIONAIRE
    Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser Russia's Interior Ministry has posted a tender seeking parties willing to “study the possibility of obtaining technical information about users (user equipment) TO…
    - 6 days ago Thursday, July 24, 2014 -
  • Google devs: Tearing Chrome away from OpenSSL not that easy
    Custom BoringSSL fork not quite a drop-in replacement yet Google is trying to migrate its Chrome browser away from the buggy OpenSSL cryptography library toward BoringSSL, its homegrown fork, but swapping out the crypto code is proving more difficult…
    - 6 days ago Thursday, July 24, 2014 -
  • Sony tries to make PlayStation Network hack row go away with $15m in cash and games
    Values customers' stolen identities at $2,500 each Sony has offered a $15m settlement to gamers after its PlayStation Network (PSN) was comprehensively pwned, but it refuses to admit that it was at fault.…
    - 6 days ago Thursday, July 24, 2014 -
  • Who has your credit card data? 1 million HOLIDAY-MAKERS' RECORDS exposed
    Travel agent fined £150K – Sloppy coding fingered A UK-based online travel firm has been fined £150,000 over a breach of breach of the Data Protection Act after their "insecure" coding reportedly exposed more than a million customer records to cy…
    - 6 days ago Thursday, July 24, 2014 -
  • Six charged over StubHub e-ticket heist for Elton John gigs
    Compromised passwords re-used, say prosecutors Six suspected cybercriminals have been indicted over their alleged involvement in a hack attack on eBay-owned ticketing website StubHub.…
    - 6 days ago Thursday, July 24, 2014 -
  • BMW's ConnectedDrive falls over, bosses blame upgrade snafu
    Traffic flows up 20% as motorway middle lanes miraculously unclog BMW's ConnectedDrive car-to-mobe interface has suffered a UK-wide outage that may also affect customers in mainland Europe.…
    - 7 days ago Thursday, July 24, 2014 -
  • 'Unsolicited texts' outrage: Man fined £4k for DPA breach
    But it WASN'T about any SMSes The owner of a marketing company which allegedly sent "millions of unsolicited text messages" was prosecuted for "failing to notify the ICO of changes to his notification" at Willesden Magistrates Court last week.…
    - 7 days ago Thursday, July 24, 2014 -
  • Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
    Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln Mozilla has released a bug-and-security update for Firefox, with 11 security fixes, three of them critical.…
    - 7 days ago Wednesday, July 23, 2014 -
  • Researcher sat on critical IE bugs for THREE YEARS
    VUPEN waited for Pwn2Own cash while IE's sandbox leaked Security outlet VUPEN has revealed it held onto a critical Internet Explorer vulnerability for three years before disclosing it at the March Pwn2Own hacker competition.…
    - 7 days ago Wednesday, July 23, 2014 -
  • 50,000 sites backdoored through shoddy WordPress plugin
    Not running WordPress? Better hope your neighbour isn't Some 50,000 sites have been sprayed with backdoors from shonky malware targeting a popular and vulnerable WordPress plugin, according to researcher Daniel Cid.…
    - 7 days ago Wednesday, July 23, 2014 -
  • Copyright kingpins charged for sailing pirate Android app ships
    Six charged, two arrested, in wake of coordinated raids. US prosecutors have unsealed indictments against six men in connection with some of the biggest, albeit now defunct, Android piracy stores.…
    - 7 days ago Wednesday, July 23, 2014 -
  • iOS slurpware brouhaha: It's for diagnostics, honest, says Apple
    Hidden packet sniffer claims hit Cupertino Faced with a growing backlash, Apple has added a page to its support website explaining iOS's previously unexplained data-slurping tools – which were recently highlighted by security researcher Jonathan Zd…
    - 7 days ago Wednesday, July 23, 2014 -
  • Stop begging, startup-land, and start YELLING at Catch of the Day
    Consumer trust boost from data breach laws would do more for online biz than any subsidy or share scheme Thank you, Catch of the Day: in taking three years – three years – to own up to a data breach (and by the way doing it late on a Friday after…
    - 7 days ago Wednesday, July 23, 2014 -
  • Tails-hacking Exodus: Here's video proof of our code-injection attack
    It's not a Tor exploit, but it will hit fully patched systems with default settings, we're told Exodus Intelligence has revealed what it claims is video evidence of researchers unmasking an anonymous user of the Tails operating system.…
    - 7 days ago Wednesday, July 23, 2014 -
  • Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
    'Prevent people that are passing by to hook up to your network', pleads plod Bungling cops in Yorkshire have called upon householders to lock down their Wi-Fi after mistaking a free hotspot user for a piggybacking connection thief.…
    - 8 days ago Wednesday, July 23, 2014 -
  • StubHub hit by trans-Atlantic fraudsters, says New York DA
    US, Canadian and UK authorities expected to reveal details today eBay's ticket-selling offshoot StubHub has admitted to a breach of some users' security by a ring of fraudsters.…
    - 8 days ago Wednesday, July 23, 2014 -
  • PayPal post-checkout cash slurp a FEATURE not a BUG
    Would you like a super-sized shipping charge with that? An apparent flaw that lets users add any amount of money onto already processed PayPal transactions is a feature, not a bug, according to the payments giant.…
    - 8 days ago Wednesday, July 23, 2014 -
  • Attackers raid SWISS BANKS with DNS and malware bombs
    'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts Attackers suspected of residing in Russia are raiding Swiss bank accounts with a multi-faceted attack that intercepts SMS tokens and changes domain name system se…
    - 8 days ago Wednesday, July 23, 2014 -
  • EFF looses Privacy Badger to munch cookies and scripts
    Furry and furious browser-protector aims to improve online privacy Chrome and Firefox users can get a better handle on who is tracking their browsing, with the EFF releasing its Privacy Badger browser plug-in to public beta.…
    - 8 days ago Tuesday, July 22, 2014 -
  • Android ransomware demands 12x more cash, targets English-speakers
    FBI child-abuse warning shake-down gets more sophisticated Cybercrooks have further refined a strain of file-infecting ransomware that infects Android smartphones so that it targets English speakers and is more difficult to remove.…
    - 8 days ago Tuesday, July 22, 2014 -
  • Goodwill's goodwill rocked as Feds probe bank card hacking scam
    We think we're safe, insists non-profit American charity Goodwill is being investigated by US federal authorities as the possible ground zero for a major debit and credit card security breach. But the company says it thinks it's in the clear.…
    - 8 days ago Tuesday, July 22, 2014 -
  • Lads from Lagos turn from 419 scams to basic malware slinging
    Smooth-tongued online lovers struggle to get to grips with slimy RAT infestations Nigerian scammers are developing beyond 419 advance-fee fraud scams against individuals by using trojans to steal valuable information from businesses instead.…
    - 8 days ago Tuesday, July 22, 2014 -
  • STILL no move by Brit data cops over Google's 2012 privacy slurp
    Even the Italian databinieri have got their boots on now, but not the ICO Britain's data cops are still investigating Google's sneaky privacy policy tweak from last year, even though many of its counterparts elsewhere in Europe have already taken act…
    - 8 days ago Tuesday, July 22, 2014 -
  • Hacker claims breach of <i>Wall Street Journal</i> and <i>Vice</i> websites, punts 'user data' for sale
    Also supposedly hit a gadgets site called 'CNET' A hacker known for attacking news websites has claimed successful hacks against both the Wall Street Journal and Vice.…
    - 8 days ago Tuesday, July 22, 2014 -
  • Lawyer reviewing terror laws and special powers: Definition of 'terrorism' is too broad
    Can sweep up hate criminals, bloggers, journos The definition of terrorism in current UK law is too broad and should be narrowed to avoid "catching" journalists, bloggers and hate criminals, a top lawyer said today.…
    - 9 days ago Tuesday, July 22, 2014 -
  • NEW, SINISTER web tracking tech fingerprints your computer by making it draw
    Have you been on YouPorn lately, perhaps? White House website? A new, persistent web-tracking technology developed has been used to track web users across many of the world's most popular websites, including those of the White House and even wholesal…
    - 9 days ago Tuesday, July 22, 2014 -
  • Cyber scum pump ransomware at victims from spambot-stuffed websites
    Command and control of mal-spam barrage done via Tor Miscreants have brewed up a strain of ransomware which functions like the recently dead CryptoLocker - and this one communicates using the Tor browsing anonymization network.…
    - 9 days ago Tuesday, July 22, 2014 -
  • Parental Controls For YouTube
    Kids seem to be glued to YouTube these days. As a parent, it can be daunting to try and police the content that they watch. What's a parent to do?In our featured article: YouTube Parental Controls...Read Full Post
    - 60 days ago Saturday, May 31, 2014 -
  • Craigslist Safety and Security Tips
    Craigslist can be both a fun and scary place. You never know what you'll find for sale, and you often don't know who is on the other end of that sale until you complete the deal....Read Full Post
    - 60 days ago Saturday, May 31, 2014 -
  • 5 Tips to Help You Land an IT Security Job
    IT security jobs are still in high demand, especially given the fact that cyber crime seems to be a constant fixture in the news with data breaches becoming an almost daily occurrence....Read Full Post
    - 60 days ago Saturday, May 31, 2014 -
  • How to Avoid Becoming a Victim of the iPhone Lock Ransom Scam
    There is a new scam sweeping through Australia and other parts of the world this week. Victims are having their iPhones locked remotely by hackers who apparently compromised their iCloud account credentials. The victims are then being issued ransom d…
    - 60 days ago Saturday, May 31, 2014 -
  • Are Your Employees Leaking Sensitive Company Information on Facebook?
    Like it or not, Facebook is here to stay. Some companies allow employees to use Facebook at work and some strictly prohibit it. If your company allows it then you might want to continue reading....Read Full Post
    - 62 days ago Thursday, May 29, 2014 -
  • Rev up Your Security with a 10-minute PC Security Tune-up
    Securing your PC doesn't have to take hours and hours of your time. There are a lot of things you can do in just a few minutes to help improve your security posture....Read Full Post
    - 62 days ago Thursday, May 29, 2014 -
  • How to Prevent Your Web Browser From Being Hijacked
    Did you just try to Google something but instead of going to Google, your browser took you to some strange search engine you've never heard of?You might have just become a victim of browser hijacking. In this week's featured article: How to Prevent…
    - 63 days ago Wednesday, May 28, 2014 -
  • Are Your Clicks Getting Jacked?
    Have you ever been clickjacked? While it may sound like some kind of pro wrestling move, I assure you it is not.Clickjacking is a security threat that users all over the world are experiencing. How can you stay safe from clickjacking? Check out our…
    - 91 days ago Wednesday, April 30, 2014 -
  • Is Your Google+ Account Secure?
    Google+ seems to be slowly gaining some traction. It's probably not quite the big Facebook contender that Google had hoped it would be, but it is gaining steamJust like Facebook, Google+ has privacy and security settings that you should configure t…
    - 91 days ago Wednesday, April 30, 2014 -
  • If Your PC Was Just Hacked, Read This:
    You've just discovered that your PC has been hacked. You could run away and go hide in a corner, or you can take action and do something about it.If you opt for taking action, then you need to check out our article: I've Been Hacked! Now What? We'l…
    - 91 days ago Wednesday, April 30, 2014 -
  • newNOAA Cybersecurity Criticized in Audit by Inspector General
    A cybersecurity audit of the National Oceanic and Atmospheric Administration uncovered an agency challenged by inconsistent security controls.read more
    - 2 hours ago Wednesday, July 30, 2014 -
  • newCountry-Specific Web Domains Can't Be Seized: ICANN
    Country Web Domains Can't be Seized: RegulatorWASHINGTON - The Internet's regulatory authority said Wednesday that country-specific Web domains cannot be seized in court proceedings, as it sought to quash an effort to recover assets in terrorism-rel…
    - 7 hours ago Wednesday, July 30, 2014 -
  • newCisco Introduces Certification for Industrial Networking Specialists
    Cisco announced on Tuesday that it has expanded its certification portfolio to include specialists in industrial networking and other fields. read more
    - 8 hours ago Wednesday, July 30, 2014 -
  • newTrio of Cybersecurity Bills Pass House
    The House of Representatives passed three cyber-security bills this week designed to bolster efforts to guard critical infrastructure companies against attacks.read more
    - 8 hours ago Wednesday, July 30, 2014 -
  • newiPhone App "Signal" Enables Free Encrypted Phone Calls
    Open Whisper Systems, the creators of the RedPhone secure calling app for Android, announced on Tuesday the availability of Signal, an iPhone application that lets users make encrypted voice calls worldwide for free.read more
    - 9 hours ago Wednesday, July 30, 2014 -
  • newTor Warns of Attack Attempting to Deanonymize Users
    The Tor Project has disclosed details of an attack which appeared to be an attempt to deanonymize users of the popular anonymity network.read more
    - 11 hours ago Wednesday, July 30, 2014 -
  • newSecurity: The Ultimate Balancing Act
    The phrase “balls to the wall” is one that has been co-opted to mean things you wouldn’t want to discuss with your grandmother. But in its original context, it referred to a centrifugal governor used on steam engines to regulate a consistent sp…
    - 12 hours ago Wednesday, July 30, 2014 -
  • newNSA Surveillance Programs Directly Damage Internet Security: Report
    “The NSA has both weakened overall trust in the network and directly harmed the security of the Internet.”read more
    - 13 hours ago Wednesday, July 30, 2014 -
  • newAccuvant Hires Former Coca-Cola CISO
    Accuvant, a Denver-based company that provides solutions and services to help clients develop and manage security programs, announced on Tuesday that former Coca-Cola chief information security officer (CISO) Renee Guttmann has joined the company as…
    - 15 hours ago Wednesday, July 30, 2014 -
  • newQualys Enhances Continuous Monitoring Services
    Qualys, a provider of cloud-based security and compliance solutions, announced enhancements to its cloud service Qualys Continuous Monitoring (CM) solution this week. read more
    - 20 hours ago Tuesday, July 29, 2014 -
  • newTor hints at possible U.S. government involvement in recent attack
    Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine.
    - 3 hours ago Wednesday, July 30, 2014 -
  • newVideo games industry is fighting an advanced cyber attack campaign
    THE VIDEO GAMES INDUSTRY is at the mercy of a large scale advanced cyber attack campaign designed to steal source code, Dell's security arm Secureworks has revealed .
    - 8 hours ago Wednesday, July 30, 2014 -
  • newNational Research Council only the most recent victim of computer hacking
    The recent cyber attack against Canada's National Research Council was not first time that foreign and domestic entities have been accused of illegally infiltrating Canadian corporate or government computers.
    - 9 hours ago Wednesday, July 30, 2014 -
  • newInternet of Things devices open up new avenues for hackers
    We're constantly being told that the internet of things is set to revolutionize the world we live in.
    - 13 hours ago Wednesday, July 30, 2014 -
  • newHackers disrupt Kenyaa s march to e-goverment
    In its latest attack, Anonymous cell Anon_0x03 on July 27 cracked, took control and used Kenya Deputy President William Ruto's Twitter account to tweet a list of government websites it had hacked.
    - 15 hours ago Wednesday, July 30, 2014 -
  • newiPhone gets first free app for encrypting voice calls
    An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.
    - 19 hours ago Wednesday, July 30, 2014 -
  • new.com | Israel's Iron Dome makers hit by China hackers
    Aviation has suffered one of its worst weeks in memory, but industry analysts and safety experts say they can find no common themes.
    - 20 hours ago Tuesday, July 29, 2014 -
  • newHackers Hit HK Media, Democracy Movement
    As advocacy groups note Beijing's increasing influence over the media in Hong Kong , and after recent violent attacks against Hong Kong journalists , the Hong Kong Journalists Association declared the past year the " darkest for press freedom" in sev…
    - 23 hours ago Tuesday, July 29, 2014 -
  • newMicrowave hacked into weapon, used to blow up a stereo
    There are some things in this world you're better off not trying, and dismantling a microwave to make a stick-mounted weapon is probably one of them.
    - 1 day ago Tuesday, July 29, 2014 -
  • newIs this the death of passwords?
    Is it possible that your next password might be as simple and subtle as the way you type or hold your smartphone? If you hate trying to fill out those CAPTCHA forms with Secrets are used to keep our stuff safe on computers; for nearly three decades n…
    - 1 day ago Tuesday, July 29, 2014 -
  • Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird
    Original release date: July 22, 2014The Mozilla Foundation has released security updates to address multiple vulnerabilities in Firefox, Firefox ESR, and Thunderbird, some of which may allow attackers to execute arbitrary code.The following updates a…
    - 8 days ago Tuesday, July 22, 2014 -
  • CPNI Releases Paper on Improving Defenses Against Targeted Attack
    Original release date: July 22, 2014The United Kingdom's Centre for the Protection of National Infrastructure (CPNI) has released a report on its “Improving Defenses Against Targeted Attack" (iDATA) cyber research program. The report contains descr…
    - 8 days ago Tuesday, July 22, 2014 -
  • Vulnerabilities in LZO and LZ4 compression libraries
    Original release date: July 21, 2014Recently disclosed vulnerabilities in the LZO and LZ4 compression libraries could allow remote code execution under certain circumstances. While these libraries are used by a large number of platforms and applicati…
    - 9 days ago Monday, July 21, 2014 -
  • Cisco Addresses Wireless Residential Gateway Vulnerability
    Original release date: July 16, 2014Cisco has released an advisory to address a vulnerability in the web server used in multiple Wireless Residential Gateway products that could allow an unauthenticated, remote attacker to crash the web server and ex…
    - 14 days ago Wednesday, July 16, 2014 -
  • Oracle Releases July 2014 Security Advisory
    Original release date: July 15, 2014Oracle has released its Critical Patch Update for July 2014 to address 113 vulnerabilities across multiple products.This update contains the following security fixes:5 for Oracle Database Server29 for Oracle Fusion…
    - 15 days ago Tuesday, July 15, 2014 -
  • Microsoft Releases Security Advisory for Improperly Issued Digital Certificates
    Original release date: July 10, 2014Microsoft has released a security advisory to address improperly issued SSL certificates that could be used in attempts to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. This issue a…
    - 20 days ago Thursday, July 10, 2014 -
  • Cisco Addresses Apache Struts 2 Vulnerability
    Original release date: July 09, 2014Multiple Cisco products include an implementation of Apache Struts 2 which contains a vulnerability that could allow an unauthenticated, remote attacker to bypass security restrictions and execute arbitrary command…
    - 21 days ago Wednesday, July 9, 2014 -
  • Adobe Releases Security Updates for Flash Player and Air
    Original release date: July 08, 2014Adobe has released security updates to address multiple vulnerabilities in Flash Player and Air. Exploitation of these vulnerabilities could potentially allow an attacker to take control of the affected system. Th…
    - 22 days ago Tuesday, July 8, 2014 -
  • Microsoft Releases July 2014 Security Bulletin
    Original release date: July 08, 2014Microsoft has released updates to address vulnerabilities in Windows, Internet Explorer, and Microsoft Service Bus for Windows Server as part of the Microsoft Security Bulletin Summary for July 2014. Some of these…
    - 22 days ago Tuesday, July 8, 2014 -
  • WordPress Releases Security Update
    Original release date: July 08, 2014WordPress 3.8.2 has been released to address multiple vulnerabilities, one of which could allow an attacker to gain unauthorized access using forged authentication cookies.  WordPress 3.7.1 users will be updated…
    - 22 days ago Tuesday, July 8, 2014 -
  • Дураки на экранах

    - Saturday, December 13, 2008 -
  • Казаки-разбойники

    - Wednesday, December 10, 2008 -
  • 22
    Привет.Сегодня 22.Сегодня госстат установил инфляцию на уровне почти 22%.Через 22 дня Новый Год!Конечно настроение не праздничное: кризис, р…
    - Monday, December 8, 2008 -
  • Маразм крепчал
    Привет.Государственный комитет статистики сообщил, что в октябре доходы населения сократились на 1% по сравнению с сентябрем до 77 627 млн.…
    - Friday, December 5, 2008 -
  • Защити себя сам
    Привет.Сокращения на многих промышленных предприятиях и массовое обналичивание всех вкладов привело к росту краж и грабежей.Наша добле…
    - Thursday, December 4, 2008 -
  • Спасите отечественного автопроизводителя
    Привет.Продолжаем наблюдать за кризисом. Очень интересно сравнивать действия в разных государствах.В нашей стране хотят ввести дополни…
    - Thursday, December 4, 2008 -
  • Шоу маст гоу вон
    Привет.Шоу под названием "антикризис в Украине" продолжается.Комментарии.net пишут, что министр финансов предлагает навязать всем банкам…
    - Wednesday, December 3, 2008 -
  • Вот такой у нас футбол
    Привет.Не запланированная заметка.Случайно зашел на Корреспондент.net:Вот такой у нас футбол: УЕЫИ на это все уже было 53 комментария.Посто…
    - Wednesday, December 3, 2008 -
  • Доллар гудбай...
    Привет.Наша страна (Украина) - оплот свободы и демократии.Сейчас многие говорят о конце доллара США - переход стран Северной Америки на ед…
    - Wednesday, December 3, 2008 -
  • Итоги ноября
    Привет.Давно я не проводил анализа входящего трафика. Сегодня подводим итоги ноября 2008 года. Общее число посещений 1038, посещено страниц -…
    - Tuesday, December 2, 2008 -
  • Пришла зима - пропала "зелень"
    Привет.В нашем "замечательном" государстве в течение последних нескольких лет национальная валюта была "жестко" привязана к национально…
    - Monday, December 1, 2008 -
  • А кто считает расходы на эксплуатацию?

    - Friday, November 28, 2008 -
  • Мой дом - моя крепость
    Привет.В нашем регионе кризис продолжает бушевать. Количество безработных (реальных) растет. Людей могут и не сокращать, но отправляют в…
    - Friday, November 28, 2008 -
  • И эти люди запрещают мне в носу ковыряться

    - Tuesday, November 25, 2008 -
  • Кризис не хотят замечать
    Привет.Кризис бушует. Предприятия сокращают свой штат. Многих отправляют в "бесплатные" отпуска. Многим задерживают зарплаты. Многим офи…
    - Monday, November 24, 2008 -