• newGadget Ogling: Dueling Tablets, a Smart Scale, and Slooow Games
    Welcome to our weekly look at the latest, greatest, and poorest gadgets to be revealed to the world. Hark as yours truly extols the virtues and horrors of two wildly different tablets, a smart kitchen scale, and video games requiring patience, among…
    - 2 days ago Saturday, November 22, 2014 -
  • newNotCompatible Mobile Malware Gets Badder
    A new version of the NotCompatible malware, which first appeared in 2012, is bigger, badder and pretty much indestructible, Lookout Security reported. And it can compromise corporate networks, thanks to the BYOD trend. The malware, called "NotCompati…
    - 3 days ago Friday, November 21, 2014 -
  • newAnother Bleak Black Friday for Apple Fans
    Apple is a company that bucks trends, that does things its own way, that manages its business through highly tuned cycles. One thing Apple barely does at all, though, is offer any sort of special deal or sale price. Not even on Black Friday. Or Cyber…
    - 3 days ago Friday, November 21, 2014 -
  • newCitadel Trojan Adds Keylogging to Arsenal
    Cybercriminals are using a new version of the dangerous Citadel Trojan, which has been employed to attack the financial and petrochemical industries, to compromise password and authentication solutions, IBM Trusteer has reported. The new version begi…
    - 3 days ago Friday, November 21, 2014 -
  • Cinnamon Desktop Spices Up Makulu Linux
    The Makulu Cinnamon Debian Edition 1.1 marks a new path for Makulu. This latest release has numerous new features that could make it a top competitor against the Linux Mint Cinnamon edition. Makulu Cinnamon Debian Edition, or MCDE, has fewer standard…
    - 3 days ago Thursday, November 20, 2014 -
  • Russian Site Exposes Thousands of Private Videocam Streams
    A Russian website has been posting live video streams from unprotected webcams in homes and businesses around the globe, Britain's Information Commissioner's Office warned on Thursday. The website has gained access to the webcams using the cameras' d…
    - 4 days ago Thursday, November 20, 2014 -
  • Twitter Opens Entire Multibillion-Tweet Gold Mine to Searchers
    Twitter this week began indexing every public tweet posted since it began operating in 2006. "Our long-standing goal has been to let people search through every tweet ever published," said Yi Zhuang, who led the project team. Use cases Zhuang cited f…
    - 4 days ago Thursday, November 20, 2014 -
  • Will Apple's Next iPhone Capture DSLR Quality With 2 Lenses?
    The Apple rumor mill never stops spinning, and even though the iPhone 6 is barely here and the next version ages away, the most interesting rumor is the chance that the next iPhone will make a huge leap forward with its camera -- possibly using two l…
    - 4 days ago Thursday, November 20, 2014 -
  • Jolla's Open Source Tablet Gets Crazy Crowd Love
    Jolla, the company set up by former Nokia executives to keep the Meego operating system alive, raised more than $841,000 on Wednesday, the first day of its Indiegogo crowdfunding campaign. That's 221 percent of its goal of $380,000 -- and the campaig…
    - 4 days ago Wednesday, November 19, 2014 -
  • WhatsApp Battens Down the Hatches
    WhatsApp has added end-to-end encryption and enabled it by default in the latest version of its Android messaging application, partner Open Whisper Systems announced Tuesday. The new feature taps Open Whisper's open source TextSecure encryption proto…
    - 5 days ago Wednesday, November 19, 2014 -
  • Google Glass May Be Saved by Obscurity
    Whatever happened to Google Glass? In the early days, people got punched in bars, bounced from movie theaters, and pulled over in cars for wearing them, and some establishments outright banned "glassholes" from their premises. Google claimed the whit…
    - 5 days ago Wednesday, November 19, 2014 -
  • newCryptoPHP - Backdoor in Thousands of CMS Plugins & Themes Used to Hijack Web Servers
    Security researchers have discovered thousands of backdoored plugins and themes for the popular content management systems (CMS) that could be used by attackers to compromise web servers on a large scale.The Netherlands-based security firm Fox-IT…
    - 2 hours ago Monday, November 24, 2014 -
  • new'Regin' - 'State-Sponsored' Spying Tool Targeted Govts, Infrastructures for Years
    Researchers have uncovered a highly advanced, sophisticated piece of malware they believe was used to spy on a wide-range of international targets including governments, infrastructure operators and other high-profile individuals since at least 2008.…
    - 4 hours ago Monday, November 24, 2014 -
  • newDoubleDirect MitM Attack Targets Android, iOS and OS X Users
    Security researchers have discovered a new type of "Man-in-the-Middle" (MitM) attack in the wild targeting smartphone and tablets users on devices running either iOS or Android around the world. The MitM attack, dubbed DoubleDirect, enables an at…
    - 2 days ago Saturday, November 22, 2014 -
  • New Citadel Trojan Targets Your Password Managers
    Unless we are a human supercomputer, remembering password is not an easy task and that too, if you have a different password for every different site. But luckily to make the whole process easy, there is a growing market for password managers which p…
    - 3 days ago Friday, November 21, 2014 -
  • Detekt — Free Anti-Malware Tool To Detect Govt. Surveillance Malware
    Human rights experts and Privacy International have launched a free tool allowing users to scan their computers for surveillance spyware, typically used by governments and other organizations to spy on human rights activists and journalists around th…
    - 3 days ago Friday, November 21, 2014 -
  • Keeping the Bots at Bay: How to Detect Brute Force Attacks
    Thanks to recent events involving certain celebrities’ stolen pictures, “brute-force attack” is now one of the hot buzz words making its rounds. As an IT professional - do you know what a brute force attack is, how to spot one when it happens,…
    - 4 days ago Thursday, November 20, 2014 -
  • Firing Range — Open Source Web App Vulnerability Scanning Tool From Google
    Google on Tuesday launched a Security testing tool "Firing Range", which aimed at improving the efficiency of automated Web application security scanners by evaluating them with a wide range of cross-site scripting (XSS) and a few other web vulnerabi…
    - 4 days ago Thursday, November 20, 2014 -
  • Billions of Android Devices Vulnerable to Privilege Escalation Except Android 5.0 Lollipop
    A security weakness in Android mobile operating system versions below 5.0 that puts potentially every Android device at risk for privilege escalation attacks, has been patched in Android 5.0 Lollipop – the latest version of the mobile operating s…
    - 4 days ago Thursday, November 20, 2014 -
  • Let’s Encrypt — A Certificate Authority to Provide Free SSL Certificates for Entire Web
    As days are passing, encryption is becoming a need for every user sitting online. Many tech giants including Google, Apple and Yahoo! are adopting encryption to serve its users security and privacy at its best, but according to Electronic Frontier Fo…
    - 5 days ago Wednesday, November 19, 2014 -
  • WhatsApp Messenger Adds End-to-End Encryption by Default
    Good news for all Privacy Lovers!! Finally the wildly popular messaging app WhatsApp has made end-to-end encryption a default feature, stepping a way forward for the online privacy of its users around the world.WhatsApp, most popular messaging ap…
    - 5 days ago Wednesday, November 19, 2014 -
  • Microsoft Releases Emergency Out-of-Band Patch for Kerberos Bug MS14-068
    Microsoft today released an "out-of-band" security updates to fix a critical vulnerability in all supported versions of its Windows Server software that cyber criminals are exploiting to compromise whole networks of computers.The Emergency patch rel…
    - 5 days ago Wednesday, November 19, 2014 -
  • 81% of Tor Users Can be Easily Unmasked By Analysing Router Information
    Tor has always been a tough target for law enforcement for years and FBI has spent millions of dollars to de-anonymize the identity of Tor users, but a latest research suggests that more than 81% of Tor clients can be "de-anonymised" by exploiting th…
    - 6 days ago Tuesday, November 18, 2014 -
  • Windows Phone 8.1 Hacked
    Do you wanna hack Nokia Lumia phone running the latest mobile operating system Windows 8.1 ?? Hackers have made it very easy for you all..!!Just few weeks after Microsoft announced a 19 year-old critical security hole existed in almost every vers…
    - 6 days ago Tuesday, November 18, 2014 -
  • Suspected Wirelurker iOS Malware Creators Arrested in China
    It’s been almost two weeks since the WireLurker malware existence was revealed for the first time, and Chinese authorities have arrested three suspects who are allegedly the authors of the Mac- and iOS-based malware that may have infected as many a…
    - 6 days ago Tuesday, November 18, 2014 -
  • OnionDuke APT Malware served through Tor Network
    The malicious Russian Tor exit node, which was claimed to be patching binary files, is actually distributing a malware program to launch cyber-espionage attacks against European government agencies.The group behind the rogue Tor exit node had lik…
    - 7 days ago Monday, November 17, 2014 -
  • BASHLITE Malware leverages ShellShock Bug to Hijack Devices Running BusyBox
    Cyber criminals are using new malware variants by exploiting GNU Bash vulnerability referred to as ShellShock (CVE-2014-6271) in order to infect embedded devices running BusyBox software, according to a researcher.A new variant of "Bashlite" malw…
    - 7 days ago Monday, November 17, 2014 -
  • Spy Planes Equipped with Dirtbox Devices Collecting Smartphone Data
    The U.S. government is reportedly using spy airplanes equipped with special military-grade snooping equipment to eavesdrop on cell phone information from millions of smartphone users in U.S, according to a new report.This little device, nicknamed…
    - 9 days ago Saturday, November 15, 2014 -
  • Darkhotel APT Malware Targets Global CEOs Using Hotel Internet
    A seven-year-old cyber espionage campaign has targeted senior level executives from large global companies by using a specialized Advanced Persistent Threat (APT), zero-day exploits, and well-developed keyloggers to extract information from them when…
    - 13 days ago Tuesday, November 11, 2014 -
  • Masque Attack — New iOS Vulnerability Allows Hackers to Replace Apps with Malware
    Android have been a long time target for cyber criminals, but now it seems that they have turned their way towards iOS devices. Apple always says that hacking their devices is too difficult for cyber crooks, but a single app has made it possible for…
    - 13 days ago Tuesday, November 11, 2014 -
  • Chinese Telecom Routes Russian Domestic Internet Traffic through China
    Russian Internet traffic, including the domestic one, has continuously been re-routed outside the country due to routing errors by China Telecom, which could result in compromising the security of Russian communications.Internet monitoring servic…
    - 13 days ago Tuesday, November 11, 2014 -
  • More than 400 Underground Sites seized by FBI in 'Operation Onymous'
    The joint operation by authorities of the U.S. Federal Bureau of Investigation (FBI) and European law enforcement seized Silk Road 2.0, an alternative to the notorious online illegal-drug marketplace last week, and arrested 26-year-old operator Blake…
    - 14 days ago Monday, November 10, 2014 -
  • Microsoft to Issue 16 Security Patches and 60 Other Updates
    Microsoft has this time quite a big pile of security patches in its November 2014 Patch Tuesday, which will address almost 60 non-security updates for its Windows OS along with 16 security updates.The software giant released Advance Notification…
    - 14 days ago Monday, November 10, 2014 -
  • FBI Seize Silk Road 2.0 Servers; Admin Arrested
    The authorities of the U.S. Federal Bureau of Investigation have announced that they have arrested "Silk Road 2.0" operator Blake Benthall, used the alias "Defcon" in California on Wednesday and charged him with conspiracy to commit drug trafficking,…
    - 17 days ago Friday, November 7, 2014 -
  • Google Releases 'nogotofail' Network Traffic Security Testing Tool
    Google introduced a new security tool to help developers detect bugs and security glitches in the network traffic security that may leave passwords and other sensitive information open to snooping.The open source tool, dubbed as Nogotofail, has b…
    - 19 days ago Wednesday, November 5, 2014 -
  • New BlackEnergy Crimeware Enhanced to Target Linux Systems and Cisco Routers

    - 19 days ago Wednesday, November 5, 2014 -
  • newGoogle case over web abuse settled
    The case of a businessman who wants to stop malicious web postings about him appearing in Google searches is settled at the High Court.
    - 54 mins ago Monday, November 24, 2014 -
  • new'Sophisticated' Regin spyware found
    An "extremely complex" and "stealthy" spying program has been stealing data from ISPs, energy companies, airlines and research-and-development labs, a security company says.
    - 59 mins ago Monday, November 24, 2014 -
  • newBreached camera site owner seeks job
    A website containing live links to thousands of baby monitors, web cams and CCTV feeds has shut down.
    - 1 hour ago Monday, November 24, 2014 -
  • newBT and Telefonica in talks over O2
    Telecoms giant BT is in talks with Telefonica about buying the O2 mobile network from the Spanish firm.
    - 1 hour ago Monday, November 24, 2014 -
  • newVIDEO: Can live events save TV ratings?
    For programme makers it is becoming increasingly difficult to generate big ratings on TV but the solution may lie in live television, especially in America, as Tom Brook reports
    - 2 hours ago Monday, November 24, 2014 -
  • newThe trouble with Bob Geldof's advice
    Bob Geldof wants people to delete Do They Know It's Christmas? and buy it again, but that's very difficult to do.
    - 2 hours ago Monday, November 24, 2014 -
  • newVIDEO: Flying the 'Nintendo' fighter jet
    How easy is it to fly Britain's next-gen fighter jet?
    - 4 hours ago Monday, November 24, 2014 -
  • newThe couple who changed the way we shop
    The couple who helped Tesco change the way many of us shop
    - 13 hours ago Sunday, November 23, 2014 -
  • newVIDEO: New web data powers plan for police
    A law forcing communications firms to pass on details that could help identify criminals using the internet is being planned by the home secretary.
    - 14 hours ago Sunday, November 23, 2014 -
  • newNew web data powers plan for police
    A law forcing communications firms to keep details that could help identify criminals using the internet is being planned by the home secretary.
    - 21 hours ago Sunday, November 23, 2014 -
  • newVIDEO: Twitter co-founder defends application
    The chairman and co-founder of Twitter is in London for the global launch of his new company 'Square'.
    - 3 days ago Friday, November 21, 2014 -
  • newGoogle tries ad-free net experiment
    Search giant Google has unveiled an experiment that lets people pay to visit sites rather than see adverts.
    - 3 days ago Friday, November 21, 2014 -
  • newRobots face new creativity test
    A US professor is proposing a successor to the famous Turing test devised to spot when artificial intelligence becomes "human".
    - 3 days ago Friday, November 21, 2014 -
  • newVIDEO: Games tech boost for movie planning
    Researchers at Abertay University in Dundee look to have given the blockbuster a boost by applying computer games technology to the film industry.
    - 3 days ago Friday, November 21, 2014 -
  • Police make computer hijack arrests
    Fifteen people have been arrested, including four in the UK, in connection with the hijacking of computers.
    - 3 days ago Friday, November 21, 2014 -
  • Please clamber around the exhibit
    Please clamber around the exhibit
    - 3 days ago Friday, November 21, 2014 -
  • Call of Duty passes $10bn in sales
    The iconic computer game has now made $10bn in sales around the world.
    - 3 days ago Friday, November 21, 2014 -
  • Embrace the arts, engineers told
    Engineering needs to emphasise its creative side to encourage more young people to take it up as a career, says a leading member of the profession.
    - 3 days ago Friday, November 21, 2014 -
  • Warnings on 'complex' Android virus
    Hundreds of thousands of Android phones have been infected with malware that uses handsets to send spam and buy event tickets in bulk.
    - 3 days ago Friday, November 21, 2014 -
  • VIDEO: YouTube studios for internet stars
    YouTube is investing millions of dollars to set up professional studios which are free to use for anyone who has at least five thousand subscribers.
    - 3 days ago Friday, November 21, 2014 -
  • Uber in Singapore taxi app regulation
    Singapore plans to regulate third-party taxi booking apps such as Uber by capping fees and limiting them to use only licensed vehicles and drivers.
    - 3 days ago Friday, November 21, 2014 -
  • Crowd investing opens up high finance
    How crowd investment platforms are shaking up start-up land
    - 4 days ago Thursday, November 20, 2014 -
  • VIDEO: The drone that fights fires
    BBC Click looks at some of the week's technology highlights.
    - 4 days ago Thursday, November 20, 2014 -
  • Russian site lists breached webcams
    Data privacy watchdogs are warning the public about a Russian website that provides links to breached webcams, baby monitors and CCTV feeds.
    - 4 days ago Thursday, November 20, 2014 -
  • VIDEO: 'Childbirth pain' lessons for men
    A hospital in China is trying to teach fathers-to-be about the experience of giving birth.
    - 4 days ago Thursday, November 20, 2014 -
  • Google and Rockstar end patent suit
    Google and patent consortium Rockstar - which includes Apple as an investor - agree to settle a patent litigation suit.
    - 4 days ago Thursday, November 20, 2014 -
  • VIDEO: Can Candy Crush strike lucky twice?
    The creators of the wildly successful mobile game Candy Crush release its follow-up: Candy Crush Soda Saga.
    - 4 days ago Thursday, November 20, 2014 -
  • Iran frees 'Blogfather' Derakhshan
    Iran's Supreme Leader has pardoned the pioneering Iranian-Canadian blogger Hossein Derakhshan after six years in prison, Iranian media report.
    - 4 days ago Thursday, November 20, 2014 -
  • Feminist Hacker Barbie
    Internet users create a web app to edit the pages of a controversial Barbie book.
    - 4 days ago Thursday, November 20, 2014 -
  • 'Poorest of poor' test talking tech
    A charity is to give away 2,000 Talking Book audio computers to some of Ghana's poorest communities after securing funds from Unicef and ARM.
    - 4 days ago Thursday, November 20, 2014 -
  • Foo Fighters to password in six steps
    As a Russian website puts thousands of live video streams online, here's a guide to turning your favourite lyrics into a strong online password.
    - 4 days ago Thursday, November 20, 2014 -
  • Nokia's brand name merry-go-round
    A new tablet branded with the Finnish firm's name creates a dilemma for Microsoft
    - 4 days ago Wednesday, November 19, 2014 -
  • Amnesty releases anti-spying program
    Amnesty International has released a program that can spot spying software used by governments to monitor activists and political opponents.
    - 5 days ago Wednesday, November 19, 2014 -
  • Giant robot trucks rise in Australia
    Huge robots slog it out in Australia's outback
    - 6 days ago Tuesday, November 18, 2014 -
  • VIDEO: TV technology for the 2020 Olympics
    How Japanese broadcaster NHK is preparing for hi-tech coverage of the 2020 Olympics.
    - 14 days ago Monday, November 10, 2014 -
  • VIDEO: Festival celebrates indie gaming
    Marc Cieslak visits GameCity which looks to promote the cultural benefits of playing games.
    - 18 days ago Thursday, November 6, 2014 -
  • newRebecca Abrahams: Solving the Threat to our Energy Grid
    co-authored by Dr. Stephen Bryen, Founder & CTO Ziklag SystemsAdmiral Michael Rogers, Director of the National Security Agency and head of the US ... Read more: Cyber Attacks, Power Grid, Energy Grid, Chinese Hackers, Russian Hackers, N…
    - 3 days ago Friday, November 21, 2014 -
  • Anonymous To Ferguson Police And KKK: ‘We Are The Law Now'
    A video surfaced Thursday reportedly released by the hacker group Anonymous warning Ferguson, Missouri police officers and the Ku Klux Klan to remain ... Read more: Kkk, Anonymous, Ferguson, Ferguson Protests, Anonymous KKK, Michael Brow…
    - 3 days ago Friday, November 21, 2014 -
  • Adam Levin: 73,000 Webcams Are Open to Peeping Toms -- Is Yours?
    If the thought of being the unwitting star of your own prime time reality show gives you the willies, consider the recent revelation that more than 73,000 unsecured webcams and surveillance cameras are, as I write this column, viewable on a Russian-b…
    - 3 days ago Friday, November 21, 2014 -
  • Dr. Jodi Gold: The Dos and Don'ts of Digital Kindness
    Most parents teach their children to be kind and caring -- but only IRL (in real life). So how do we teach Digital Kindness? My list of Dos and Don'ts gives families a checklist all technology users should memorize -- grown-ups included.…
    - 4 days ago Thursday, November 20, 2014 -
  • David L. Brown: Small Business Poised to Receive a Big Holiday Gift This Year
    With high-profile security breaches continuing to hit major national retailers, affecting tens of millions of shoppers since the 2013 holiday season, it's no surprise to see the that these events are influencing consumers to shop small businesses thi…
    - 6 days ago Tuesday, November 18, 2014 -
  • Andre Bourque: What's Your #SkypeDay? A Lesson in Password Recovery
    According to GoodSecurityQuestions.com (yes, there really is a site by that name, the best IT security questions meet five criteria. Read more: Cyber Security, Skype, Microsoft Skype, Password Protection, Password Security, Microsoft, T…
    - 7 days ago Monday, November 17, 2014 -
  • Hacker Group Goes To War With The KKK Over Ferguson Protests
    WASHINGTON -- Members of the hacker collective Anonymous are targeting the Ku Klux Klan after the designated hate group reportedly threatened proteste... Read more: Kkk, Anonymous, Ferguson, Ferguson Protests, Anonymous KKK, Michael Brow…
    - 7 days ago Monday, November 17, 2014 -
  • State Dept Computers Hacked, Email Shut Down
    WASHINGTON (AP) — The State Department has taken the unprecedented step of shutting down its entire unclassified email system as technicians repair ... Read more: Ap, State Department Hacked, State Department, State Department Cybersec…
    - 8 days ago Sunday, November 16, 2014 -
  • Shane Paul Neil: Big Data and Bigger Breaches With Alex Pentland of Monument Capital Group
    He has spent a lot of time addressing the failings of big data systems and pushing for better infrastructure and security protocols across the board. He has even developed a consumer level data platform that mimics what the big guys should be doing.…
    - 10 days ago Friday, November 14, 2014 -
  • Joe Ross: Finding a Cure for Medical Identity Theft
    As we head into the final stretch of 2014, large-scale financial and retail breaches are top-of-mind for many of us, especially as we get ready for holiday shopping. But here is another type of identity theft that all consumers should be aware of and…
    - 10 days ago Friday, November 14, 2014 -
  • Robert Siciliano: How Your Webcam May Be Spying on You
    Remember that song from 1984, "Somebody's watching me?" It was a great foreshadowing of things to come: These days, people really CAN watch you while you go about your business at home...through your computer. Read more: Technology, Iden…
    - 12 days ago Wednesday, November 12, 2014 -
  • Tibetan Monks Plagued By Cyber Attacks Pledging To 'Detach From Attachments'
    DHARAMSALA, India (AP) — Buffeted by persistent cyberattacks, Tibetan monks are giving new meaning to their ancient creed: Detach from attachments.... Read more: Buddhism, Tibetan Buddhism, Buddhist, Buddhist Monks, Computers, Hackers…
    - 13 days ago Tuesday, November 11, 2014 -
  • Brian E. Finch: Five Cyber Security Takeaways From the Mid-Term elections
    While not a much-discussed topic during campaign season, federal policy on cyber-security will likely see some material changes as a result of a Republican-controlled Senate. Just how significant those changes will be have yet to be determined, but h…
    - 13 days ago Tuesday, November 11, 2014 -
  • The Biggest Threat To Gov't Computers: Federal Employees
    They have clicked links in bogus phishing emails, opened malware-laden websites and been tricked by scammers into sharing information.Federal employ... Read more: Defense Department, Education Department, Robert Curtis, Freedom of Infor…
    - 14 days ago Sunday, November 9, 2014 -
  • Google Study Finds Email Scams Are More Effective Than You'd Expect
    You know those weird emails that try to trick you into handing over your information? Turns out they work way better than you'd expect, according to a... Read more: Phishing, Phishing Scam, Email Phishing, Email Privacy, Jpmorgan Chase H…
    - 17 days ago Friday, November 7, 2014 -
  • Rebecca Abrahams: Cyber Retaliation: A Byte for a Byte?
    Co-authored by Dr. Stephen Bryen, Founder & CTO Ziklag SystemsThe Pentagon has Plan X --a scheme to retaliate against cyber attacks. No one knows... Read more: Data Theft, Cyber Espionage, Cyber Spying, China, Russia, Phone Hacking, Cy…
    - 18 days ago Thursday, November 6, 2014 -
  • John Horton: If ICANN Doesn't Keep Registrars Honest, Who Will?
    Last week, The Wall Street Journal detailed the challenges that drug safety authorities like the FDA face when tackling the illegal and unsafe distrib... Read more: Icann, Domain Names, Internet Governance, Pharmaceuticals, Cybercrime,…
    - 19 days ago Wednesday, November 5, 2014 -
  • Franz-Stefan Gady: The Axiom Report: Cybersecurity and Its Impact on China-U.S. Relations
    While the actual impact of the Novetta report on making U.S. systems more secure from Chinese attacks in the long run will be negligible on the diplomatic front, the recent Axiom revelations will allow the U.S. government to press the Chinese side ha…
    - 19 days ago Wednesday, November 5, 2014 -
  • CreditSesame.com: Fear and Worry in America? Identity Theft and Cybercrime
    What's the biggest worry for Americans? Here's a clue. It's not Ebola, terrorism or spiders. According to two separate studies and polls in just the last two weeks, the two things that most Americans worry about, even fear, are identity theft and hac…
    - 19 days ago Wednesday, November 5, 2014 -
  • Jason Glassberg: A Hacker Survival Guide For SMBs
    While cyber attacks on major U.S. corporations like Target and Home Depot garner most of the media coverage on hacking, the reality is, smaller businesses also face significant risks. Read more: Smbs, Small Medium Business, Cybersecurity…
    - 19 days ago Wednesday, November 5, 2014 -
  • John Roman, Ph.D.: #GamerGate, Victimization, and the Role of the FBI
    The FBI cannot prosecute a case without a victim. If you have been a victim of the anonymous #GamerGate mob, let them know. The National Center for Victims of Crime can help too. Read more: Gamergate, #GamerGate, Fbi, Cybercrime, Crime,…
    - 21 days ago Monday, November 3, 2014 -
  • Adam Levin: Here's How the New Chip-and-PIN Credit Cards Could Be DOA
    Whether the hackers banked a false sense of security at the institutional level, knowing that the protocols might be deemed an unnecessary expense, or the recent attacks are merely part of the chip card learning curve, this latest technology is only…
    - 24 days ago Friday, October 31, 2014 -
  • Ashley Massis: What Small Business Owners Need to Know About an IT Security Breach
    If you are the owner of a business or a freelancer like I am, a lot of your work and information is kept through a variety of internet platforms. Additionally, a lot of your transactions are internet based. Read more: Hacking, Computer H…
    - 25 days ago Thursday, October 30, 2014 -
  • Robert Siciliano: Keanu Reeves two Intruders in two Days
    Keanu Reeves recently had a home intruder: a woman. It was 4:00 am when she got into his home and plopped in a chair. The 40-something nut-job told the movie star she was there to meet with him. He nonchalantly called 911. Police took the woman into…
    - 25 days ago Thursday, October 30, 2014 -
  • Why Credit Card Companies Couldn't Stop Hacks At Target And Home Depot
    While public outrage over recent data breaches has focused mostly on the retailers that were hacked, several security experts say the credit card indu... Read more: Credit Card Hacks, Credit Card Security, Target Hack, Home Depot Hack, C…
    - 26 days ago Wednesday, October 29, 2014 -
  • Luring The Elusive Cyber Security Pro
    Struggling to find scarce IT security talent? Make sure your hiring managers understand the certifications and match candidates for skills fit -- not just credentials.
    - Monday, April 14, 2014 -
  • Amazon Plans 3D Phone: Report
    Amazon phone capable of displaying images in three dimensions could ship this fall.
    - Saturday, April 12, 2014 -
  • Google Glass Goes Public
    Google Glass Explorer Program will be open to US-based adults on tax day.
    - Saturday, April 12, 2014 -
  • Facebook Changes: What To Expect
    Facebook cracks down on spammy posts, tweaks privacy options, and revamps messaging. Here's what it means to you.
    - Saturday, April 12, 2014 -
  • Hacker Weev Free After Appeal
    Andrew "Weev" Auernheimer, who embarrassed AT&T by exposing a security flaw, had his conviction overturned by federal appeals court.
    - Friday, April 11, 2014 -
  • Rogue IT Driven By Need For Speed
    We've lost control to business users before. But this time, the thing that initiated our pain (the cloud) may also be the cure.
    - Friday, April 11, 2014 -
  • 5 Ways Android Won Me Over
    From security to "Lego" programming, Android has more going for it than you might think.
    - Friday, April 11, 2014 -
  • 5 Job Interview Tips Via Alice In Wonderland
    Curiouser and curiouser! Use these techniques during your next interview to win that IT or security job offer.
    - Thursday, April 10, 2014 -
  • Google Glass For Parkinson's: 10 Findings
    Google Glass offers more health benefits than awkwardness, Parkinson's patients in UK study find.
    - Thursday, April 10, 2014 -
  • Hackathons Should Be More Than A Circus
    Tapping into developer talent at a hackathon should be fun, but don't lose sight of the potential business benefits.
    - Thursday, April 10, 2014 -
  • 5 reasons why hackers own your organization
    Last week I noted that most companies are either already hacked or could easily be hacked -- and, when they have anything worth stealing, are probably already owned by multiple APT (advanced persistent threat) groups.
    - 69 days ago Tuesday, September 16, 2014 -
  • How network virtualization is used as a security tool
    When people think of network virtualization, the advantages that come to mind typically include faster provisioning of networks, easier management of networks and more efficient use of resources. But network virtualization can have another major bene…
    - 70 days ago Monday, September 15, 2014 -
  • Sprint, Windstream traffic routing errors hijacked other ISPs
    Internet traffic routing errors made by U.S. operators Sprint and Windstream on the same day last week underscore a long-known Internet weakness, posing both security and reliability issues. Both of the errors involved Border Gateway Protocol (BGP),…
    - 70 days ago Monday, September 15, 2014 -
  • Data protection authorities find privacy lapses in majority of mobile apps
    Many mobile apps request too many permissions and don't explain how they collect users' personal information, a study of 1,211 popular apps by the Global Privacy Enforcement Network has found. The majority of the apps reviewed did not adequately expl…
    - 73 days ago Friday, September 12, 2014 -
  • Yahoo says it faced $250,000 daily fines for defying U.S. surveillance requests
    The U.S. government once threatened to fine Yahoo $250,000 a day if it failed to assist with its surveillance efforts, Yahoo said Thursday. Yahoo said it was threatened with the fines after it challenged surveillance powers granted to the U.S. govern…
    - 73 days ago Friday, September 12, 2014 -
  • How Google's tiff with certificate authorities can impact you
    Miffed certificate authorities are calling on Google to give websites more time to upgrade the security used in browser-to-server communications before displaying warnings in Chrome. The CAs are upset over Google's roughly six-month timetable for rat…
    - 74 days ago Thursday, September 11, 2014 -
  • Enemies no more, McAfee and Symantec agree to share threat data
    The recently launched Cyber Threat Alliance has been given a big boost with the news that Intel's McAfee division and former arch-enemy Symantec are to join the industry group whose mission is to create the first significant cross-vendor movement of…
    - 74 days ago Thursday, September 11, 2014 -
  • 3 security practices IoT will disrupt
    I made it back from DEFCON with both my phone and tablet intact, but I'm happy I didn't bring a light bulb. You see, if had brought a light bulb, and that light bulb was a smart LED bulb running Linux, it might be running someone else's software by n…
    - 74 days ago Thursday, September 11, 2014 -
  • Five million Gmail addresses and passwords dumped online
    An archive containing nearly 5 million Gmail addresses and plain text passwords was posted Tuesday on an online forum, but the data is old and likely sourced from multiple data breaches according to one security firm. A user with the online alias "tv…
    - 75 days ago Wednesday, September 10, 2014 -
  • Internet Explorer steals the Patch Tuesday spotlight again
    It's hard to imagine that we are already three-fourths of the way through 2014 -- at least as measured by Microsoft Patch Tuesdays. Today, Microsoft released four new security bulletins, but only one of them is Critical. Guess which one?
    - 75 days ago Wednesday, September 10, 2014 -
  • Cloud security: We're asking the wrong questions
    In the wake of the celebrity photo breach, the media is humming with stories disparaging the safety of the cloud.
    - 75 days ago Wednesday, September 10, 2014 -
  • Adobe fixes critical flaws in Flash Player, delays Reader and Acrobat updates
    Adobe Systems released a critical security update for Flash Player that fixes 12 security vulnerabilities, but pushed back its planned patches for Reader and Acrobat by a week. The Flash Player updates, available for Windows, Mac, and Linux, address…
    - 76 days ago Tuesday, September 9, 2014 -
  • Comcast's open Wi-Fi hotspots inject ads into your browser
    Comcast is giving users a very good reason to demand an HTTPS connection on every site they visit. The Internet service provider has started injecting ads for its services on websites where you wouldn't normally see them when you're using an Xfinity…
    - 76 days ago Tuesday, September 9, 2014 -
  • Salesforce.com warns customers of malware attack
    Salesforce.com users are being targeted by a new version of a computer Trojan that has typically attacked online banking customers until now. The malware threat is called Dyre or Dyreza and came to light in June. Like most online banking Trojans, it…
    - 76 days ago Tuesday, September 9, 2014 -
  • What you need to know about the Home Depot data breach
    On Monday, Home Depot issued a public confirmation to reports that they had experienced a data breach impacting debit and credit cards. They're the world's largest home improvement retailer, operating 2,266 stores in the U.S., as well as 10 Canadian…
    - 76 days ago Tuesday, September 9, 2014 -
  • Tech industry groups ask U.S. Senate to 'swiftly pass' NSA curbs
    Tech industry organizations have written a letter to leaders in the U.S. Senate, to ask them to swiftly pass the USA Freedom Act, legislation that is expected to end the collection of bulk domestic phone data by the National Security Agency.
    - 76 days ago Tuesday, September 9, 2014 -
  • Home Depot confirms breach of its payment systems
    Home Depot said Monday that its payment systems had been breached, potentially affecting any customers who shopped at its stores in the United States and Canada since April. There's no evidence yet that debit card PIN numbers had been compromised, th…
    - 77 days ago Monday, September 8, 2014 -
  • IBM secures SoftLayer with Intel trusted modules
    Fortifying its SoftLayer cloud services for enterprise use, IBM has started using Intel's chip-based Trusted Execution Technology to help organizations in highly regulated industries meet their auditing and security compliance requirements. On Monday…
    - 77 days ago Monday, September 8, 2014 -
  • Adobe slates critical Reader security update for Tuesday
    Adobe yesterday said it would issue security updates next week for its PDF viewer Reader as well as for Acrobat, its PDF creator, to fix critical flaws in the software on Windows and Apple's OS X. But it won't be updating Flash Player, its ultra-popu…
    - 80 days ago Friday, September 5, 2014 -
  • Apple CEO says iCloud security will be strengthened
    Apple, still reeling from the nude celebrity photo incident, plans to soon strengthen security around its iCloud storage service, according to CEO Tim Cook in a news report Thursday.
    - 80 days ago Friday, September 5, 2014 -
  • Governments act against webcam-snooping websites
    Government officials in the U.S. and the UK are warning people to secure their webcams after websites that broadcast the contents of those cameras have sprung up online.One of the better-known sites, Insecam, appeared to have gone offline after the w…
    - 3 days ago Friday, November 21, 2014 -
  • NSA chief says cyberattacks on industrial systems are his top concern
    Multiple nation-states are investing in their capabilities to hack critical U.S. infrastructure, making defense of those networks a top priority, U.S. National Security Agency chief Admiral Mike Rogers said Thursday.Attackers are seeking detailed inf…
    - 3 days ago Thursday, November 20, 2014 -
  • Next year's DDOS attacks to come from Vietnam, India and Indonesia
    Vietnam, India and Indonesia might not have the most advanced Internet infrastructure, but they do have a large number of insecure smartphones coming online, making them the big botnet sources for next year's distributed denial of service attacks, ac…
    - 6 days ago Tuesday, November 18, 2014 -
  • Microsoft patches Kerberos vulnerability with emergency update
    Microsoft released an out-of-band patch on Tuesday, addressing a vulnerability in Kerberos KBC, a component that handles authentication on local networks.The patch was supposed to have been released earlier this month, but Microsoft withheld it due t…
    - 6 days ago Tuesday, November 18, 2014 -
  • This suspected cybercriminal may be buying coke with your online bank funds
    On the coffee table was a message etched in powder, presumably cocaine: "I really miss you."The photo was on a social networking profile of a 23-year-old man in Ukraine that analysts with a Danish computer security company believe designed and rents…
    - 10 days ago Friday, November 14, 2014 -
  • Microsoft: Competing AV vendors need to remember who the bad guys are
    AV vendors, in fierce competition for users, should remember that cooperation is key in fighting malware, a top Microsoft security official said Friday.Data sharing between vendors has resulted in a drop in the overall number of malware families affe…
    - 10 days ago Friday, November 14, 2014 -
  • Tor-based Anonabox router revises troubled history as it resurfaces on Indiegogo
    Anonabox, a portable router that claims to hide your online tracks, is taking another stab at crowdfunding after getting booted from Kickstarter last month. The Tor-based device has resurfaced on Indiegogo, where it has already surpassed its $13,370…
    - 13 days ago Tuesday, November 11, 2014 -
  • Tor Project mulls how Feds took down hidden websites
    Little is known about how U.S. and European law enforcement shut down more than 400 websites, including Silk Road 2.0, which used technology that hides their true IP addresses.The websites were set up using a special feature of the Tor network, which…
    - 14 days ago Monday, November 10, 2014 -
  • Employee-owned PCs are scaring enterprise IT
    Largely ignored in the enterprise mobility craze of the last few years, which saw the acceptance of bring-your-own device (BYOD) policies, were the risks incurred when employees use their personal computers to access business data. Now, with PCs desi…
    - 18 days ago Thursday, November 6, 2014 -
  • Cisco patches serious vulnerabilities in small business RV Series routers
    Cisco Systems released patches for its small business RV Series routers and firewalls to address vulnerabilities that could allow attackers to execute arbitrary commands and overwrite files on the vulnerable devices.The affected products are Cisco RV…
    - 18 days ago Thursday, November 6, 2014 -
  • Microsoft's top legal gun decries privacy "arms race"
    The conflict between snooping governments seeking to defeat encryption and users demanding ever more robust privacy tools has turned into an arms race -- and it's time for arms control talks, Microsoft's general counsel said on Tuesday.Resolving that…
    - 19 days ago Wednesday, November 5, 2014 -
  • Firewall admins turning off security to boost performance - bad move
    A third of organizations are turning off some of their next-generation firewall's (NGFW) security features to boost performance with the most commonly deactivated layer being intrusion prevention, a McAfee survey has discovered.Of the 504 professio…
    - 21 days ago Monday, November 3, 2014 -
  • Hackers target unclassified White House network
    Hackers targeted an unclassified White House network but did not damage any systems, a White House official said Tuesday.In the course of assessing recent threats, "activity of concern" was found on the unclassified Executive Office of the Presiden…
    - 26 days ago Wednesday, October 29, 2014 -
  • White House officials confirm breach on unclassified network
    A White House official, speaking on the condition of anonymity, said that suspicious activity has been identified on the Executive Office of the President (EOP) network.The official, speaking to Reuters, said that mitigation efforts were ongoing, but…
    - 26 days ago Wednesday, October 29, 2014 -
  • Report: Criminals use Shellshock against mail servers to build botnet
    Targeting message transfer agents (MTAs), and mail delivery agents (MDAs), criminals are using Shellshock as a means to create botnets. The process is slow, but working, thanks to unpatched installations of Bash or certain implementations of it.Whe…
    - 28 days ago Monday, October 27, 2014 -
  • Tor Project flags Russian 'exit node' server for delivering malware
    The Tor Project has flagged a server in Russia after a security researcher found it slipped in malware when users were downloading files.Tor is short for The Onion Router, which is software that offers users a greater degree of privacy when browsin…
    - 28 days ago Sunday, October 26, 2014 -
  • USB is now UEC (use with extreme caution)
    USB is an acronym for Universal Serial Bus; at least that is what it has stood for since 1999 when it was patented. But now it may take on a new meaning and instead stand for Ultimate Security Breakdown. To read this article in full or to leave a c…
    - 34 days ago Tuesday, October 21, 2014 -
  • Staples confirms data breach investigation
    Monday evening, investigative journalist Brian Krebs reported that multiple banking sources were seeing a pattern of credit and debit card fraud. The common thread between each case were purchases made at Staples Inc. stores in the Northeastern U.S.T…
    - 34 days ago Monday, October 20, 2014 -
  • Obama signs Executive Order to bolster federal credit card security
    On Friday, at the headquarters of the Consumer Financial Protection Bureau, President Obama signed an Executive Order that will add chip-and-PIN protections (EMV) to federal credit cards starting in January. The President encouraged the financial an…
    - 35 days ago Monday, October 20, 2014 -
  • Dreaded SSLv3 bug no monster, only a POODLE
    On Tuesday, Google's Bodo Möller, along with fellow researchers Thai Duong and Krzysztof Kotowicz, disclosed the existence of a vulnerability in SSLv3, which allows the plaintext of secure connections to be calculated by an attacker on the network.W…
    - 41 days ago Tuesday, October 14, 2014 -
  • Mobile Threat Monday: Google Play Isn't Perfect
    You're definitely more likely to pick up malware at third-party app stores, but sometimes a bad apple makes it into Google Play. That's why you need a mobile security product.
    - -
  • ADV: The Antispyware Center from PCMag.com
    From the editors at PCMag.com we're proud to introduce the AntiSpyware Center! This new Web resource serves up-to-the minute news on spyware threats alongside the information you need to protect yourself against them. Product reviews, feature article…
    - -
  • Stop Comparing Every Critical Bug to Heartbleed, Shellshock
    Not every critical vulnerability has to be compared to Heartbleed to be taken seriously. In fact, there is no need to bring up Heartbleed or Shellshock when there is a new software flaw which requires immediate attention.
    - -
  • Is Your Antivirus Running?
    A recent study by Microsoft revealed that if you've let your antivirus subscription expire, you're almost as likely to be infected by malware as somebody with no antivirus at all. Keep your subscription current, and make sure your antivirus has the l…
    - -
  • How the FBI Took Down Silk Road 2.0 and 400 Other Dark Web Sites
    Tor Project speculates on how law enforcement agencies managed to locate black market websites using the Tor network in "Operation Onymous."
    - -
  • Mobile Threat Monday: The Top Four Android Threats
    This week on Mobile Threat Monday, we look at Lookout's list of the top four Android threats.
    - -
  • Survey Shows Many Home Networks Are Insecure
    Your computers and smartphones have security protection, sure, but most security companies have ignored another vulnerable spot, the home router. A survey by Avast shows that most users know little or nothing about how to protect that router.
    - -
  • Bitdefender Rating Slips in Independent Test
    The various antivirus programs move up and down in different lab tests, but there's typically little change at the top. The latest report from Dennis Technology Labs shows that this stability isn't universal.
    - -
  • Mobile Threat Monday: Fake AdBlock App Infiltrates Google Play
    This week, Malwarebytes shows us the app that made it past Google's app store guardians and, potentially, onto hundreds of thousands of phones.
    - -
  • Changing the Way We Fight Malware
    A host of isolated security companies vying to see who's best at fighting malware can't win the battle. But by working together and sharing information, the antimalware ecosystem just might be able to outgun the bad guys.
    - -
  • Seattle Public Schools data improperly released, at least 8,000 students affected
    Seattle Public Schools is notifying parents that personal information on as few as 8,000 special education students was improperly released.
    - 10 days ago Friday, November 14, 2014 -
  • Safe tether: Wearables
    Wearable devices efficiently monitor user activity, but also open new targets for malware authors, reports Alan Earls.
    - 21 days ago Monday, November 3, 2014 -
  • Acting out: Cyber simulation exercises
    Simulation exercises show how companies should respond under a cyberattack, says HHS's Sara Hall. Teri Robinson reports.
    - 21 days ago Monday, November 3, 2014 -
  • Network care: Case study
    When a care provider supplied laptops to its roving employees, it added a security solution to enable efficient collaboration. Greg Masters reports.
    - 21 days ago Monday, November 3, 2014 -
  • A balancing act: Apple technology
    Apple's iPhone 6 and iOS 8 offer encryption for mobile users, but a focus on consumers can create security conundrums, reports Lee Sustar.
    - 21 days ago Monday, November 3, 2014 -
  • Upping the ante: PCI Security Standard
    The latest iteration of the PCI Security Standard calls for moving beyond simply meeting compliance mandates, reports Jim Romeo.
    - 21 days ago Monday, November 3, 2014 -
  • newYou stupid BRICK! PCs running Avast AV can't handle Windows fixes
    Fix issued, fingers pointed, forums in flames Security software outfit Avast are trying to figure out why the combination of recent Windows patches and updates to the latter company's software are breaking PCs.…
    - 4 hours ago Monday, November 24, 2014 -
  • newSony quietly POODLE-proofs Playstations
    Innocuous 'system software stability' update brings no patch, no surf, regime Sony has patched the POODLE SSL vulnerability in its Playstation 3 and 4 gaming consoles.…
    - 5 hours ago Monday, November 24, 2014 -
  • new'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
    'A degree of technical competence rarely seen' A highly advanced malware instance said to be as sophisticated as the famous Stuxnet and Duqu has has been detected. "Regin" has security researchers opining it may be nastier than both.…
    - 7 hours ago Sunday, November 23, 2014 -
  • newCrypto protocols held back by legacy, says ENISA
    EU takes the microscope to security The EU Agency for Network Information and Security (ENISA) has updated its 2013 crypto guidelines, designed to help developers protect personal information in line with EU law, and has sternly told crypto designers…
    - 10 hours ago Sunday, November 23, 2014 -
  • newSandWorm thrived thanks to botched MSFT patch says HP
    Issues known and understood for at least two years before Shai-Hulud crawled out of the code Microsoft had a chance to crush the SandWorm bug before it crawled out of the dunes, but botched the job, says HP.…
    - 14 hours ago Sunday, November 23, 2014 -
  • newHACKERS can DELETE SURVEILLANCE DVRS remotely – report
    Hikvision devices wide open to hacking, claim securobods DVR systems from Hikvision have vulnerabilities that open the door to hacking, security researchers have warned.…
    - 3 days ago Friday, November 21, 2014 -
  • newCIA crypto-king offers new 'clock' clue to crack Kryptos code
    Big structure in full public view unlikely to contain anything important The man who built a cryptographic sculpture for the CIA has provided a second clue to help crack its infamously difficult code.…
    - 3 days ago Friday, November 21, 2014 -
  • DoubleDirect hackers snaffle fandroid and iPhone-strokers' secrets
    Windows and Linux seem immune from redirection assault Hackers are running “Man-in-the-Middle” attacks (MitM) against smartphones using a new attack technique, security researchers warn.…
    - 3 days ago Friday, November 21, 2014 -
  • PayPal takes 18 months to patch critical remote code execution hole
    Dusty patch paid out Paypal has closed a remote code execution vulnerability in its service some 18 months after it was reported.…
    - 3 days ago Friday, November 21, 2014 -
  • GCHQ and Cable and Wireless teamed as Masters of the Internet™
    New Snowden docs show telco was a willing partner in global data vaccuum Cable and Wireless provided UK intelligence agency GCHQ with access to the internet connections of millions of global users, going as far as to tap India's second largest telco,…
    - 3 days ago Thursday, November 20, 2014 -
  • Parental Controls For YouTube
    Kids seem to be glued to YouTube these days. As a parent, it can be daunting to try and police the content that they watch. What's a parent to do?In our featured article: YouTube Parental Controls...Read Full Post
    - Saturday, May 31, 2014 -
  • Craigslist Safety and Security Tips
    Craigslist can be both a fun and scary place. You never know what you'll find for sale, and you often don't know who is on the other end of that sale until you complete the deal....Read Full Post
    - Saturday, May 31, 2014 -
  • 5 Tips to Help You Land an IT Security Job
    IT security jobs are still in high demand, especially given the fact that cyber crime seems to be a constant fixture in the news with data breaches becoming an almost daily occurrence....Read Full Post
    - Saturday, May 31, 2014 -
  • How to Avoid Becoming a Victim of the iPhone Lock Ransom Scam
    There is a new scam sweeping through Australia and other parts of the world this week. Victims are having their iPhones locked remotely by hackers who apparently compromised their iCloud account credentials. The victims are then being issued ransom d…
    - Saturday, May 31, 2014 -
  • Are Your Employees Leaking Sensitive Company Information on Facebook?
    Like it or not, Facebook is here to stay. Some companies allow employees to use Facebook at work and some strictly prohibit it. If your company allows it then you might want to continue reading....Read Full Post
    - Thursday, May 29, 2014 -
  • Rev up Your Security with a 10-minute PC Security Tune-up
    Securing your PC doesn't have to take hours and hours of your time. There are a lot of things you can do in just a few minutes to help improve your security posture....Read Full Post
    - Thursday, May 29, 2014 -
  • How to Prevent Your Web Browser From Being Hijacked
    Did you just try to Google something but instead of going to Google, your browser took you to some strange search engine you've never heard of?You might have just become a victim of browser hijacking. In this week's featured article: How to Prevent…
    - Wednesday, May 28, 2014 -
  • Are Your Clicks Getting Jacked?
    Have you ever been clickjacked? While it may sound like some kind of pro wrestling move, I assure you it is not.Clickjacking is a security threat that users all over the world are experiencing. How can you stay safe from clickjacking? Check out our…
    - Wednesday, April 30, 2014 -
  • Is Your Google+ Account Secure?
    Google+ seems to be slowly gaining some traction. It's probably not quite the big Facebook contender that Google had hoped it would be, but it is gaining steamJust like Facebook, Google+ has privacy and security settings that you should configure t…
    - Wednesday, April 30, 2014 -
  • If Your PC Was Just Hacked, Read This:
    You've just discovered that your PC has been hacked. You could run away and go hide in a corner, or you can take action and do something about it.If you opt for taking action, then you need to check out our article: I've Been Hacked! Now What? We'l…
    - Wednesday, April 30, 2014 -
  • newFraud Service Uses Charity Websites to Validate Stolen Credit Card Data
    Cybercriminals who specialize in payment card fraud can verify the validity of stolen data by using an automated tool which conducts transactions on the websites of non-profit organizations, researchers at PhishLabs reported on Friday.read more…
    - 29 mins ago Monday, November 24, 2014 -
  • newAttackers Hijack Craigslist Domain Name
    [UPDATE] Users looking to visit online classifieds titan Craigslist on Sunday evening were redirected to a site hosted at the domain DigitalGangster(dot)Com, as a result of a DNS hijack.read more
    - 8 hours ago Sunday, November 23, 2014 -
  • newBackdoored CMS Plugins Used to Hijack Web Servers
    Malicious CMS Plugins Used to Hijack Web Servers For Black Hat SEOThousands of backdoored plugins and themes for popular content management systems (CMS) are being leveraged by a threat group to abuse Web servers on a large scale.read more
    - 3 days ago Friday, November 21, 2014 -
  • newRadware Launches Hybrid DDoS Attack Protection Solution
    Radware, a company best known for its DDoS attack mitigation and application deliver appliances, this week announced a new hybrid solution designed to help enterprise organizations detect and protect against sophisticated and volumetric DDoS attacks.…
    - 3 days ago Friday, November 21, 2014 -
  • newWordPress 4.0.1 Released to Address Critical XSS, Other Vulnerabilities
    With the release of WordPress 4.0.1, the developers of the popular blogging tool and a content management system (CMS) have addressed several vulnerabilities, including a critical flaw that could have been exploited to compromise websites.read more…
    - 3 days ago Friday, November 21, 2014 -
  • newSiemens Fixes Critical Vulnerabilities in WinCC SCADA Products
    Vulnerabilities Expose SCADA Systems to Remote AttacksSiemens has released software updates to address two critical vulnerabilities in its SIMATIC WinCC supervisory control and data acquisition (SCADA) system, one of which could be exploited remotel…
    - 3 days ago Friday, November 21, 2014 -
  • Windows RCE Vulnerability Exploited in the Wild
    Security companies have started detecting attacks that leverage a critical remote code execution (RCE) vulnerability in Windows, which Microsoft patched last week.read more
    - 3 days ago Friday, November 21, 2014 -
  • Internal and External Forces Shaping Cybersecurity in Financial Services
    Financial services already being one of America’s most highly regulated industries, recent news that Wall Street’s top trade group was calling for creation of a new inter-agency working group comprised of data security regulators at first seems l…
    - 3 days ago Friday, November 21, 2014 -
  • NexDefense Launches Anomaly Detection Solution for Industrial Networks
    NexDefense, a provider of cybersecurity solutions for automation and control systems, this week announced the availability of a new an Industrial Network Anomaly Detection (INAD) system designed to help customers detect and respond to abnormal behavi…
    - 4 days ago Thursday, November 20, 2014 -
  • CIA Chief Weighs Ambitious Overhaul of Spy Agency
    CIA Director John Brennan has ordered a sweeping internal review that could dramatically change how the country's leading spy agency is organized, officials said Thursday. read more
    - 4 days ago Thursday, November 20, 2014 -
  • newHacker claiming ties to Anonymous forces Toronto police website offline for hours
    The Toronto Police Service's website went offline Sunday after a Twitter user who claims to be connected with the hacker group Anonymous threatened to infiltrate it. The City of Ottawa website was hacked late Friday afternoon, with the name of an Ott…
    - 32 mins ago Monday, November 24, 2014 -
  • new'No one is safe': Hacking threat
    YOU'VE been hacked and you don't even know it. In fact, you're probably being hacked right now, at this very moment.
    - 15 hours ago Sunday, November 23, 2014 -
  • newPopeyes comes to North Olmsted; hacker attacks Olmsted Falls website: Best of the Beat
    Popeyes comes to North Olmsted; a hacker attacks Olmsted Falls website, and Fairview Park's mayor wants improvements to Giant Eagle. Catch up on these stories and others you might have missed over the past week from Fairview Park, Lakewood, North Olm…
    - 19 hours ago Sunday, November 23, 2014 -
  • newCyber-crime unit launched by police
    Congratulations, you're now registered! Let us know what news and updates you want to hear about and we'll send them straight to your inbox. Internet hackers target more than 40 people in the county every month according to Northants Police, which ha…
    - 23 hours ago Sunday, November 23, 2014 -
  • newPurported City of Ottawa website hacker returns to social media
    The tweeter purporting to be behind the hacking of the City of Ottawa website returned to social media late Saturday afternoon with a barrage of messages. After spending much of Saturday off the Internet, the tweeter purporting to be behind the hacki…
    - 1 day ago Sunday, November 23, 2014 -
  • newHacking for nude pics on the rise, say experts
    Hacking into computers for nude photos and threatening to expose victims online is among a growing type of crime, say cyber experts and police. With a proliferation of apps and websites in an increasingly digitalized world, sharing sexually-explicit…
    - 1 day ago Saturday, November 22, 2014 -
  • newAfter Backlash, Computer Engineer Barbie Gets New Set Of Skills
    Women in the technology field have faced all manner of insults, including, most recently, GamerGate, which highlighted sexism and harassment in video game culture. This week, another insult - from a seemingly more benign source - set off a loud onlin…
    - 1 day ago Saturday, November 22, 2014 -
  • newAnonymous pledges more attacks in Canada
    The Anonymous hacker group that took credit for Friday's cyber attack on Ottawa City Hall has pledged eight more targets in Canada, including Ottawa Police and the Supreme Court. The group has taken responsibility for Friday's hack, in which Ottawa.c…
    - 2 days ago Saturday, November 22, 2014 -
  • newHackers work to turn holiday shopping boom into boon for data thieves
    As Americans collapse onto their couches next week after a marathon day of shopping, they'll leave behind the telltale evidence of another Black Friday in the books: a nearly infinite number of credit machines on the verge of exhaustion from all the…
    - 2 days ago Saturday, November 22, 2014 -
  • newFour Held In UK Amid Crackdown On Hacking
    The men are arrested as part of an operation against suspected users of trojans which allow hackers to gain control of computers. Four people have been arrested in Britain as part of an international operation against computer hackers, the National C…
    - 2 days ago Saturday, November 22, 2014 -
  • newGang rape victim possibly hacked, Winter Springs police say
    IT WAS CLEAR TONIGHT COSBY WAS SURROUNDED BY LOYAL SUPPORTERS. SAY THE VICTIM OF A GANG RAPE IS NOW LIKELY A VICTIM AGAIN.
    - 2 days ago Saturday, November 22, 2014 -
  • newProtecting your home cameras from hackers
    Thousands of home cameras here in the U.S. hacked and are now being live streamed on a Russian website at this very moment. Protecting your home cameras from hackers Thousands of home cameras here in the U.S. hacked and are now being live streamed on…
    - 2 days ago Friday, November 21, 2014 -
  • newCalifornia man sentenced to 18 months for hacking into cash registers at Subway sandwich shops
    A man who hacked into computerized cash registers at Subway sandwich shops and stole more than $40,000 in gift cards has been sentenced in Boston to 18 months in prison. U.S. District Judge Richard Stearns also sentenced 46-year-old Lake Elsinore, Ca…
    - 3 days ago Friday, November 21, 2014 -
  • newNYC man gets prison for role in cybercrime ring
    A New York City man was sentenced Friday to more than three years in prison for his role in an international cybercrime ring that prosecutors say hacked into the computers of more than a dozen financial institutions and the U.S. military's payroll se…
    - 3 days ago Friday, November 21, 2014 -
  • newDon't Get Hacked
    Say you ignored one of those "this website is not trusted" warnings and it led to your computer being hacked. How would you react? Would you: For a group of college students participating in a research experiment, all of the above were true.
    - 3 days ago Friday, November 21, 2014 -
  • newRussian hackers hijack webcams worldwide - including at least four in Ottawa
    Hackers have created a website to hijack the webcam feeds of more than 73,000 people, including hundreds from Canada - and apparently at least four from Ottawa - and are sharing those video feeds with peeping Toms the world over. The hackers' website…
    - 3 days ago Friday, November 21, 2014 -
  • Gov't: China could take down US power grid
    China and "probably one or two other" countries have the capacity to shut down the nation's power grid and other critical infrastructure through a cyber attack, the head of the National Security Agency told a Congressional panel Thursday. Admiral Mic…
    - 3 days ago Friday, November 21, 2014 -
  • newWordPress Releases Security Update
    Original release date: November 21, 2014WordPress 4.0.1 has been released to address multiple vulnerabilities, one of which could allow a site to be compromised by a remote attacker. WordPress 3.9.2 and earlier are affected by this vulnerability. US…
    - 3 days ago Friday, November 21, 2014 -
  • Drupal Releases Security Advisory
    Original release date: November 20, 2014Drupal has released an advisory to address multiple vulnerabilities in Drupal core 6.x versions prior to 6.34 and Drupal core 7.x versions prior to 7.34, one of which could allow a remote attacker to cause a de…
    - 4 days ago Thursday, November 20, 2014 -
  • Google Releases Security Update for Chrome
    Original release date: November 19, 2014Google has released Chrome 39.0.2171.65 for Windows, Mac and Linux. This update addresses multiple vulnerabilities, one of which could cause a denial of service condition.Users and administrators are encouraged…
    - 5 days ago Wednesday, November 19, 2014 -
  • Microsoft Releases Out-of-Band Security Bulletin for Windows Kerberos Vulnerability
    Original release date: November 18, 2014 | Last revised: November 19, 2014Microsoft has released security updates to address a remote elevation of privilege vulnerability which exists in implementations of Kerberos KDC in Microsoft Windows. Exploitat…
    - 6 days ago Tuesday, November 18, 2014 -
  • IC3 Releases Scam Alert for Fraudulent Online Advertisements
    Original release date: November 18, 2014The Internet Crime Complaint Center (IC3) released a Scam Alert regarding fraudulent ads for normally expensive items, such as cars and boats, at discounted prices. Scam operators often use false contact inform…
    - 6 days ago Tuesday, November 18, 2014 -
  • Apple Releases Security Updates for iOS, OS X Yosemite, and Apple TV
    Original release date: November 17, 2014Apple released security updates for iOS devices, OS X Yosemite and Apple TV to address multiple vulnerabilities, one of which could allow remote attackers to execute arbitrary commands.Updates available include…
    - 7 days ago Monday, November 17, 2014 -
  • IC3 Releases “Tech Support” Themed Scam Alert
    Original release date: November 13, 2014The Internet Crime Complaint Center (IC3), a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C) to combat Internet crime, has released a Scam Alert a…
    - 11 days ago Thursday, November 13, 2014 -
  • Google Releases Security Update for Chrome
    Original release date: November 11, 2014Google has released Chrome 38.0.2125.122 for Windows, Mac and Linux. This update addresses a vulnerability which could potentially allow an attacker to take over an affected system.US-CERT encourages users and…
    - 12 days ago Tuesday, November 11, 2014 -
  • Adobe Releases Security Updates for Flash Player
    Original release date: November 11, 2014Adobe has released security updates to address multiple vulnerabilities in Flash Player, one of which could potentially allow an attacker to take control of the affected system.Users and administrators are enco…
    - 13 days ago Tuesday, November 11, 2014 -
  • Microsoft Releases November 2014 Security Bulletin
    Original release date: November 11, 2014Microsoft has released updates to address vulnerabilities in Windows, Office, Exchange, .NET Framework, SharePoint, and Internet Explorer as part of the Microsoft Security Bulletin Summary for November 2014. So…
    - 13 days ago Tuesday, November 11, 2014 -
  • Дураки на экранах

    - Saturday, December 13, 2008 -
  • Казаки-разбойники

    - Wednesday, December 10, 2008 -
  • 22
    Привет.Сегодня 22.Сегодня госстат установил инфляцию на уровне почти 22%.Через 22 дня Новый Год!Конечно настроение не праздничное: кризис, р…
    - Monday, December 8, 2008 -
  • Маразм крепчал
    Привет.Государственный комитет статистики сообщил, что в октябре доходы населения сократились на 1% по сравнению с сентябрем до 77 627 млн.…
    - Friday, December 5, 2008 -
  • Защити себя сам
    Привет.Сокращения на многих промышленных предприятиях и массовое обналичивание всех вкладов привело к росту краж и грабежей.Наша добле…
    - Thursday, December 4, 2008 -
  • Спасите отечественного автопроизводителя
    Привет.Продолжаем наблюдать за кризисом. Очень интересно сравнивать действия в разных государствах.В нашей стране хотят ввести дополни…
    - Thursday, December 4, 2008 -
  • Шоу маст гоу вон
    Привет.Шоу под названием "антикризис в Украине" продолжается.Комментарии.net пишут, что министр финансов предлагает навязать всем банкам…
    - Wednesday, December 3, 2008 -
  • Вот такой у нас футбол
    Привет.Не запланированная заметка.Случайно зашел на Корреспондент.net:Вот такой у нас футбол: УЕЫИ на это все уже было 53 комментария.Посто…
    - Wednesday, December 3, 2008 -
  • Доллар гудбай...
    Привет.Наша страна (Украина) - оплот свободы и демократии.Сейчас многие говорят о конце доллара США - переход стран Северной Америки на ед…
    - Wednesday, December 3, 2008 -
  • Итоги ноября
    Привет.Давно я не проводил анализа входящего трафика. Сегодня подводим итоги ноября 2008 года. Общее число посещений 1038, посещено страниц -…
    - Tuesday, December 2, 2008 -
  • Пришла зима - пропала "зелень"
    Привет.В нашем "замечательном" государстве в течение последних нескольких лет национальная валюта была "жестко" привязана к национально…
    - Monday, December 1, 2008 -
  • А кто считает расходы на эксплуатацию?

    - Friday, November 28, 2008 -
  • Мой дом - моя крепость
    Привет.В нашем регионе кризис продолжает бушевать. Количество безработных (реальных) растет. Людей могут и не сокращать, но отправляют в…
    - Friday, November 28, 2008 -
  • И эти люди запрещают мне в носу ковыряться

    - Tuesday, November 25, 2008 -
  • Кризис не хотят замечать
    Привет.Кризис бушует. Предприятия сокращают свой штат. Многих отправляют в "бесплатные" отпуска. Многим задерживают зарплаты. Многим офи…
    - Monday, November 24, 2008 -