• newFBI Addressing Leak Of Nude Celebrity Photos
    ANTHONY McCARTNEY, Associated PressLOS ANGELES (AP) — The FBI said Monday it was addressing allegations that online accounts of several celebrit... Read more: Jennifer Lawrence, Fbi, Icloud, Fbi Nude Celebrity Photos, Jennifer Lawrenc…
    - 19 hours ago Monday, September 1, 2014 -
  • Robert Siciliano: Family Identity Theft Is Ugly
    It's easy, for instance, for a parent to access their child's name and Social Security number, then open up a phony account--even if the victim is literally a child. Most companies don't check the ages, so that's why this crime can go undetected for…
    - 4 days ago Friday, August 29, 2014 -
  • Robert Siciliano: Best Way to Destroy a Computer Virus
    You can outwit cybercriminals. You just have to be a little smarter than they are and never think, "It can't happen to MY computer." There's nothing special about your computer that makes it intrinsically immune to cyber threats. Read mo…
    - 5 days ago Thursday, August 28, 2014 -
  • Russian Hackers Said to Loot Gigabytes of Big Bank Data
    Russian hackers attacked JPMorgan Chase & Co. and at least four other banks this month in a coordinated assault that resulted in the loss of gigabytes... Read more: Banking, JP Morgan, Cyberattacks, Hacking, Business News
    - 6 days ago Wednesday, August 27, 2014 -
  • Sam Fiorella: Facebook to Fix Security Issue in iOS App
    My security concerns over our increasing use of mobile apps, for which we rarely read the permission settings or terms of service, were met with harsh criticism by some who said I was wearing a tinfoil hat and breeding paranoia. Read mor…
    - 7 days ago Tuesday, August 26, 2014 -
  • Brian E. Finch: A Needed Review
    There will always be a place for providing police departments with equipment to respond to violent threats, but right now taking a step back to see how more can be done to protect against electronic threats is not only right, it is vital.…
    - 7 days ago Tuesday, August 26, 2014 -
  • Tom Galvin: Corporate Crackdown Could Quiet Cybercrime
    However, it is too simple, and inaccurate, to blame the Internet for the rise of these illegal enterprises. It might be a cybercrime mastermind behind the website offering the goods, but there is nothing high-tech about the delivery of the drugs to y…
    - 7 days ago Tuesday, August 26, 2014 -
  • Laura Dunn: Women in Business: Q&A with Maria Horton, Founder and CEO of EmeSec Inc.
    Educated as a nurse, Maria Horton is a service-disabled veteran retired from the U.S. Navy who became the first Nurse Corps Officer to become a CIO of... Read more: Cybersecurity, Women in Business, Business News, Emesec, Maria Horton,…
    - 7 days ago Tuesday, August 26, 2014 -
  • Rebecca Abrahams: Think Twice Before Using Your Smartphone
    As smartphones are increasingly used for financial transactions, sharing sensitive personal and proprietary information, and for operating other devices (such as home security systems), the field for intruders grows and becomes increasingly attractiv…
    - 8 days ago Monday, August 25, 2014 -
  • Robert Siciliano: Cybersecurity Insurance Still Requires Cybersecurity
    OpenSSL vulnerabilities are sticking around for a while. In fact, recently two new ones were announced. Read more: Identity Theft, Technology, Business, Hacking, Credit Scores, Privacy, Hackers, Identity Protection, Cybersecurity, Techn…
    - 9 days ago Sunday, August 24, 2014 -
  • Hackers Bring Down PlayStation Network
    Gamers woke up to an unpleasant surprise on Sunday morning when hackers brought down Sony's PlayStation Network by way of a distributed denial-of-serv... Read more: Sony Playstation Network, Playstation Ddos Attack, Playstation Network,…
    - 9 days ago Sunday, August 24, 2014 -
  • Adam Levin: Can One of These Obsessions Get You Scammed?
    We all have our areas of interest -- make that obsession -- and when something related to them crops up online, we can be instantly transformed into monster click machines. The problem here: Many of those clicks can either lead to your victimization…
    - 11 days ago Friday, August 22, 2014 -
  • Robert Siciliano: Before Getting Rid of Your Old Printer, Say 'Goodbye' to Lingering Data
    Most of us use our smartphones and computers on a daily basis and keep important information on them like passwords, user names, and credit card numbers. But there are other devices that hold sensitive data that we don't really talk about. For exampl…
    - 11 days ago Friday, August 22, 2014 -
  • UPS Stores In 24 States Breached By Malware
    Some customers of The UPS Store may have had their credit and debit card information exposed by a computer virus found on systems at 51 stores in 24 s... Read more: United Parcel Service, Cybersecurity, Ups, Chelsea Lee, Ups Store, Malwa…
    - 12 days ago Wednesday, August 20, 2014 -
  • Robert Siciliano: Beware of the Lottery Scam
    There's one born every minute. Many scammers use the names of valid lottery organizations, but this doesn't mean the legit entities are involved. The latest con is to tell someone they won a Powerball jackpot while planning on stealing their identity…
    - 14 days ago Tuesday, August 19, 2014 -
  • Suren Ramasubbu: Top 10 Children's Health Concerns
    Every parent has concerns about children's health and safety, but sometimes it helps to know that you are not alone. The C.S. Mott Children's Hospital publishes a national (US-wide) poll based on an annual survey, and this year's results are as revea…
    - 15 days ago Monday, August 18, 2014 -
  • Samuel Bucholtz: 6 Ways Developers Can Prevent Password Breaches
    Is the password system really broken? In reality, the problem with passwords today is largely due to how they're managed by applications. Read more: Two-Factor Authentication, Passwords, Cybersecurity, Brute Force, Biometrics, Data Breac…
    - 15 days ago Monday, August 18, 2014 -
  • Sam Fiorella: How Much Privacy Are We Willing to Risk For Mobile Connectivity?
    More of us need to challenge social networks and app developers by reading permissions settings, terms of service, etc., and where we're not comfortable, we need to stand up and say no. Read more: Mobile Applications, Terms of Service, S…
    - 18 days ago Friday, August 15, 2014 -
  • Brian E. Finch: What Do I Need to Know and When Do I Need to Know It?
    Another day, another big hack discovered. According to reports from the New York Times, the WSJ, and numerous other publications, a small group of cyber criminals based out of Russia were apparently able to collect around 1.2 billion usernames and pa…
    - 19 days ago Thursday, August 14, 2014 -
  • Anonymous Threatens To Release Name Of Officer In Ferguson Police Shooting
    The hacker group Anonymous claims it has the name of the Ferguson, Missouri, police officer involved in the fatal shooting of an unarmed black teenage... Read more: Anonymous, Hackers, (Not Provided), Ferguson Shooting, Police, Anonymous…
    - 20 days ago Wednesday, August 13, 2014 -
  • Robert Siciliano: 8 Ways to Bullet Proof Your Social Accounts
    There are ways to keep the hackers at bay--for the most part, anyways, since no protection is 100 percent efficient. Read more: Identity Theft, Social Media, Hacking, Privacy, Identity Protection, Hackers, Huffpost Code News
    - 21 days ago Tuesday, August 12, 2014 -
  • Robert Siciliano: Healthcare Providers Gaining Trust by Marketing Security
    You’ve surely heard of “B2B” or business-to-business marketing. The new game plan is “B2C” – business to consumer ... Read more: Identity Theft, Technology, Business, Hacking, Credit Scores, Privacy, Hackers, Identity Protect…
    - 21 days ago Tuesday, August 12, 2014 -
  • Jeff Fox: How to Keep Your Car from Becoming a High-Tech Death Trap
    What if driving your car exposed you to the tender mercies of online criminals the same way that using a credit card at Target last fall did? Read more: Autos, Internet Safety, Internet of Things, Unsafe at Any Speed, Danger, Cars, Cyber…
    - 23 days ago Sunday, August 10, 2014 -
  • Robert Siciliano: Data Breaches May Result in Board Breakups
    The ripple effect continues to haunt Target: It's expected that seven of its board of directors members may be replaced because they failed to provide effective oversight into the corporation's data-protection risks. Boards simply need to be more pro…
    - 26 days ago Thursday, August 7, 2014 -
  • Your Password Laziness Makes Life So Much Easier For Russian Hackers
    A gang of Russian hackers recently stole more than 1 billion usernames and passwords, and they likely got help from an unlikely accomplice: you.Ou... Read more: Passwords Stolen, Passwords, Cybersecurity, Hack, Data Breach, Hackers, noa…
    - 27 days ago Wednesday, August 6, 2014 -
  • newDigital Clone: You Won't Be Able to Live Without One
    A very interesting book just hit the market. Written by Martine Rothblatt -- apparently she is America's top paid female CEO -- its title is Virtually Human: The Promise -- and the Peril -- of Digital Immortality. The subject is digital clones, and R…
    - 23 hours ago Monday, September 1, 2014 -
  • Peach OSI Is Fresh and Juicy
    Peach OSI is a new Linux distro that stands apart from the crowd. Its first stable version was just released in June -- yet it displays more performance traits and sophistication than many Linux distros that have been searching for an audience for ye…
    - 4 days ago Friday, August 29, 2014 -
  • Gadget Ogling: Sapphire Phones, Waterproof Reads, Connected Hats and a Runner's Salvation
    A current trend among smartphone makers is to thrust a sapphire screen onto the face. Among the 17 million rumors regarding the next iPhone is that it will feature such a display -- the camera and Touch ID components already feature sapphire. Until A…
    - 4 days ago Friday, August 29, 2014 -
  • Apple's About to Kick Mobile Payments Into High Gear
    Rumor has it that when Apple reveals its much-hyped iPhone 6 on Sept. 9, one of the features it will be trumpeting -- finally -- is near field communication. The NFC tech will enable mobile payments, Wired reported, citing sources "familiar with the…
    - 4 days ago Friday, August 29, 2014 -
  • Samsung, LG Unveil Smartwatches With Sex Appeal
    Samsung and LG both announced brand-new smartwatches on Wednesday in the run-up to next week's IFA 2014 consumer electronics trade show in Berlin. Featuring a sleek, curved Super AMOLED display along with 3G, Bluetooth and WiFi connectivity, the Sams…
    - 5 days ago Thursday, August 28, 2014 -
  • Ralph Lauren Takes a Swing at Fitness Tech
    Ralph Lauren this week merged the tech and fashion worlds with a new smart Polo shirt. Knitted into the Polo Tech shirt's core are sensors that read biological and physiological information. The company partnered with Msignal to develop a "black box"…
    - 5 days ago Thursday, August 28, 2014 -
  • Hacker Attacks on Healthcare Providers Jump 600 Percent
    The recent data breach at Community Health Systems, in which Chinese hackers stole the personal information of 4.3 million patients, was another sign of a disturbing trend: Healthcare providers are coming under cyberattack at an alarming rate. "We've…
    - 5 days ago Thursday, August 28, 2014 -
  • Robo Brain Teaches a Robot to Fish
    Researchers are building Robo Brain, a large-scale computational system that collates information from the Internet, from computer simulations, and from real-life robot trials -- and learns from it. That knowledge base will be used to drive prototype…
    - 5 days ago Thursday, August 28, 2014 -
  • A Big Honking iPad Could Roll Right Over Apple's Speed Bump
    While the Microsoft Surface Pro 3 is working to establish itself as the perfect tweener device between tablet and laptop, one hot rumor suggests that Apple's answer for more working space on an iPad will come in the form of a bigger screen -- 12.9 in…
    - 6 days ago Wednesday, August 27, 2014 -
  • newReported Apple iCloud Hack Leaked Hundreds of Nude Celebrity Photos
    Now this gonna be the height of Privacy Breach! Nude images of several high-profile persona including actors, models, singers and presenters have been made available online in a blatant hacking leak linked to the Apple iCloud service.The recent p…
    - 5 hours ago Tuesday, September 2, 2014 -
  • Malicious Advertisements Found on Java.com, Other High-Profile Sites
    A New York-based online ad network company AppNexus, that provides a platform specializing in real-time online advertising, has again been spotted as the origin of a recent "malvertising" campaign that makes use of the Angler Exploit Kit to redirect…
    - 4 days ago Friday, August 29, 2014 -
  • Microsoft Fixes Faulty Patch Update that Caused Windows 'Blue Screens of Death'
    Microsoft today reissued a security update for Windows to the faulty update that previously caused PCs to suffer Blue Screens of Death (BSoD).The new security update comes almost two weeks after reports emerged that the dodgy update crippled user…
    - 5 days ago Thursday, August 28, 2014 -
  • Popular Hackforums Website Defaced by Egyptian Hacker
    Hackforums - one of the popular hacking forum in the world - has been hacked and defaced by the famous Egyptian hacker with the online handle Eg-R1z.HackForums is popular among both whitehats and blackhats. On one end of the spectrum, HackForums…
    - 5 days ago Thursday, August 28, 2014 -
  • HardCoded Backdoor Found in China-made Netis, Netcore Routers
    Routers manufactured and sold by Chinese security vendor have a hard-coded password that leaves users with a wide-open backdoor that could easily be exploited by attackers to monitor the Internet traffic.The routers are sold under the brand name…
    - 6 days ago Wednesday, August 27, 2014 -
  • Google Chrome 64-bit Browser Finally Released As a Stable Version
    Along with the release of Chrome 37 for Windows, Mac, and Linux, Google today also released a long-awaited 64-bit stable version of its Chrome browser for Windows systems. The company has been working on the 64-bit support for Windows 7 and Windows 8…
    - 6 days ago Wednesday, August 27, 2014 -
  • 70% of South Korean Population Victimized In Online Gaming Heist
    More than half of South Korea's 50 million population aged between 15 and 65 have been affected in a massive data breach, compromising their personal information.The data breach came to light when 16 individual were arrested following the theft o…
    - 6 days ago Wednesday, August 27, 2014 -
  • Stealing Encryption Keys Just by Touching a Laptop
    As far sci-fi movies have been entertaining the public, but their ideas have always been a matter of adoption in real life. Just like in any other sci-fi movie, simply touching a laptop can be enough to extract the cryptographic keys used to secure d…
    - 6 days ago Wednesday, August 27, 2014 -
  • ICREACH — NSA's Secret Google-Like Search Engine for Metadata Analysis
    The United States National Security Agency (NSA) is using a massive information sharing platform that allows multiple law enforcement agencies to infiltrate more than 850 billion communications records detailing e-mails, phone calls, instant messages…
    - 7 days ago Tuesday, August 26, 2014 -
  • Sony PlayStation Network Taken Down By DDoS Attack
    It’s been a bad weekend for Sony Playstation. The entire PlayStation Network was down much of the day after a dedicated distributed denial-of-service (DDoS) attack by online attackers, which left the network inaccessible to users. It's possible…
    - 7 days ago Tuesday, August 26, 2014 -
  • Hacking Gmail App with 92 Percent Success Rate
    A group of security researchers has successfully discovered a method to hack into six out of seven popular Smartphone apps, including Gmail across all the three platforms - Android, Windows, and iOS operating systems - with shockingly high success ra…
    - 10 days ago Saturday, August 23, 2014 -
  • Remote Attack Could Format Your Pebble Smartwatch Easily
    Pebble, a wristwatch that can connect to your phone - both iOS and Android - and interact with apps, has a hard-coded vulnerability that allows a remote attacker to destroy your Smartwatch completely.Pebble Smartwatch, developed and released by P…
    - 10 days ago Saturday, August 23, 2014 -
  • Facebook Awards $50,000 Under Its New 'Internet Defense Prize' Program
    Along with a dream to make Internet access available to everyone across the world, Facebook founder Mark Zuckerberg is working to make the Internet a more secure place as well.Till now, a number of large technology companies have bug bounty progr…
    - 11 days ago Friday, August 22, 2014 -
  • Samsung To Pay $2.3 Million Fine for Deceiving the U.S. Government
    The United States division of Samsung has been charged with deceiving the US government into believing that several of its products met the necessary US government policies, resulting in the US government buying unauthorised Chinese-made electronics.…
    - 11 days ago Friday, August 22, 2014 -
  • Hacking Traffic Lights is Amazingly Really Easy
    Hacking Internet of Things (IoTs) have become an amazing practice for cyber criminals out there, but messing with Traffic lights would be something more crazy for them.The hacking scenes in hollywood movies has just been a source of entertainment fo…
    - 12 days ago Thursday, August 21, 2014 -
  • AlienVault Releases Intrusion Detection Systems (IDS) Best Practices
    Network security practitioners rely heavily on intrusion detection systems (IDS) to identify malicious activity on their networks by examining network traffic in real time. IDS are available in Network (NIDS) and Host (HIDS) forms, as well as for Wir…
    - 13 days ago Wednesday, August 20, 2014 -
  • 'AdThief' Chinese Malware Infects Over 75,000 Jailbroken iOS devices
    If you have jailbroken your iPhone, iPad, or iPod touch and have downloaded pirated tweaks from pirated repositories, then you may be infected by “AdThief” malware, a Chinese malware that is now installed on more than 75,000 iPhone devices.Ac…
    - 13 days ago Wednesday, August 20, 2014 -
  • Google Map Tracks Your Every Move. Check Your 'Location History' to Verify It
    Google has been involved in several controversies including among the companies that was claimed to cooperate with US surveillance agencies on their global data-mining programmes, and just yesterday the popular Media tycoon Rupert Murdoch labeled Goo…
    - 13 days ago Wednesday, August 20, 2014 -
  • Cryptography Expert Says, 'PGP Encryption is Fundamentally Broken, Time for PGP to Die'
    A Senior cryptography expert has claimed multiple issues with PGP email encryption - an open source end-to-end encryption to secure email.Before continuing, I would like to clarify that covering this topic doesn't mean you should stop using PGP enc…
    - 14 days ago Tuesday, August 19, 2014 -
  • 'Google Is Worse Than the NSA' — Rupert Murdoch
    The United States National Intelligence Agency (NSA) or the largest Internet giant Google - According to you, which one is the worse?NSA? But, according to the popular Media tycoon Rupert Murdoch (@rupertmurdoch), Google is worse than the NSA.<…
    - 14 days ago Tuesday, August 19, 2014 -
  • Microsoft Says to Uninstall August Patch Updates, Causing 'Blue Screen of Death'
    Microsoft on Friday quietly urged its users to uninstall the most recent round of security updates, after reports emerged that it crippled their computers with the infamous “Blue Screens of Death” (BSoD), which is really a matter of shame for one…
    - 14 days ago Tuesday, August 19, 2014 -
  • Grocery Stores 'Supervalu' and 'Albertsons' Hacked for Credit Card Data
    Albertson’s and SuperValu - Two nation’s most popular supermarket store chains announced last weekend that a data breach may have revealed the credit and debit card information of their customers at a number of grocery store locations in more tha…
    - 15 days ago Monday, August 18, 2014 -
  • Hillary Clinton's Phone Intercepted by German intelligence Agency
    After the allegations that the U.S. National Security Agency (NSA) not only conducted mass surveillance on German citizens, but also spied on German Chancellor Angela Merkel’s own personal mobile phone for years, surveillance has become a big issue…
    - 16 days ago Sunday, August 17, 2014 -
  • Hacking Fiverr.com Accounts — Vulnerability Puts $50 Million Company At Risk
    Fiverr.com, a global online marketplace which provides a platform for people to sell their services for five dollars per job, is vulnerable to a critical web application vulnerability that puts its millions of users at risk.Fiverr recently raised…
    - 16 days ago Sunday, August 17, 2014 -
  • Sick Facebook Scammers Exploit Robin Williams' Suicide
    Scammers spare no incident to target as many victims as possible, and this time they are exploiting the tragic death of comic actor Robin Williams by offering the fake Facebook videos proclaiming a Goodbye video message that Williams made before his…
    - 17 days ago Saturday, August 16, 2014 -
  • Luring The Elusive Cyber Security Pro
    Struggling to find scarce IT security talent? Make sure your hiring managers understand the certifications and match candidates for skills fit -- not just credentials.
    - Monday, April 14, 2014 -
  • Amazon Plans 3D Phone: Report
    Amazon phone capable of displaying images in three dimensions could ship this fall.
    - Saturday, April 12, 2014 -
  • Google Glass Goes Public
    Google Glass Explorer Program will be open to US-based adults on tax day.
    - Saturday, April 12, 2014 -
  • Facebook Changes: What To Expect
    Facebook cracks down on spammy posts, tweaks privacy options, and revamps messaging. Here's what it means to you.
    - Saturday, April 12, 2014 -
  • Hacker Weev Free After Appeal
    Andrew "Weev" Auernheimer, who embarrassed AT&T by exposing a security flaw, had his conviction overturned by federal appeals court.
    - Friday, April 11, 2014 -
  • Rogue IT Driven By Need For Speed
    We've lost control to business users before. But this time, the thing that initiated our pain (the cloud) may also be the cure.
    - Friday, April 11, 2014 -
  • 5 Ways Android Won Me Over
    From security to "Lego" programming, Android has more going for it than you might think.
    - Friday, April 11, 2014 -
  • 5 Job Interview Tips Via Alice In Wonderland
    Curiouser and curiouser! Use these techniques during your next interview to win that IT or security job offer.
    - Thursday, April 10, 2014 -
  • Google Glass For Parkinson's: 10 Findings
    Google Glass offers more health benefits than awkwardness, Parkinson's patients in UK study find.
    - Thursday, April 10, 2014 -
  • Hackathons Should Be More Than A Circus
    Tapping into developer talent at a hackathon should be fun, but don't lose sight of the potential business benefits.
    - Thursday, April 10, 2014 -
  • So long, iOS -- jailbreakers have found their home: Android
    This week, another virus was reported infecting jailbroken iPhones. Honestly, if you jailbreak your iPhone or iPad, you deserve what you get as a result.
    - 11 days ago Friday, August 22, 2014 -
  • The UPS Store says malware found on systems of 51 stores
    The UPS Store said Wednesday that malicious software was found on the systems of 51 of its franchises in 24 U.S. states, although no fraud has been detected yet. The subsidiary of United Parcel Service, which has 4,470 U.S. stores, said in a notice t…
    - 12 days ago Thursday, August 21, 2014 -
  • SDS still young, but very much on the rise
    Anything "software-defined"-- networks, storage, data centers--is grabbing a lot of attention these days. Security is no exception. Software-defined security (SDS) is an emerging model in which information security is deployed, controlled and managed…
    - 12 days ago Thursday, August 21, 2014 -
  • Heartbleed to blame for Community Health Systems breach
    According to a blog post from TrustedSec, an information security consultancy in Ohio, the breach at Community Health Systems (CHS) is the result of attackers targeting a flaw OpenSSL, CVE-2014-0160, better known as Heartbleed. The incident marks the…
    - 13 days ago Wednesday, August 20, 2014 -
  • Many Chrome browser extensions do sneaky things
    An analysis by security researchers of 48,000 extensions for Google's Chrome browser uncovered many that are used for fraud and data theft -- actions that are mostly undetectable to regular users. The study, due to be presented Thursday at the Usenix…
    - 13 days ago Wednesday, August 20, 2014 -
  • How to solve Java's security problem
    Java applications remain a popular target for cyber criminals, as they are widely used to control access to critical data, despite Java's continuing struggles with security vulnerabilities. In this installment, John Matthew Holt, founder and chief te…
    - 13 days ago Wednesday, August 20, 2014 -
  • Why would Chinese hackers want hospital patient data?
    The theft of personal data on 4.5 million patients of Community Health Systems by hackers in China highlights the increasing degree to which hospitals are becoming lucrative targets for information theft.
    - 14 days ago Tuesday, August 19, 2014 -
  • Symantec folds nine Norton products into one service
    Symantec will consolidate its cluttered Norton line of security software, folding nine products into one online service that can be used across desktop computers and mobile devices. The product, in beta now, will simply be called "Norton Security" an…
    - 14 days ago Tuesday, August 19, 2014 -
  • Fear the golden ticket attack!
    Credit: Joseph Francis/Andrey Pokomeda
    - 14 days ago Tuesday, August 19, 2014 -
  • Hackers steal data on 4.5 million U.S. hospital patients
    A major U.S. hospital operator says hackers based in China broke into its computer systems and stole data on 4.5 million patients. Community Health Systems said the attack occurred in April and June of this year, but it wasn't until July that it dete…
    - 15 days ago Monday, August 18, 2014 -
  • newJPMorgan breach likely impacts UCard users – again
    The story is nearly identical to one from nearly a year ago. It starts with JPMorgan Chase disclosing that they've suffered a data breach.The bank says that an unknown number of records have been compromised, but it's certain that the incident impact…
    - 3 hours ago Tuesday, September 2, 2014 -
  • newWhy hackers may be stealing your credit card numbers for years
    While conducting a penetration test of a major Canadian retailer, Rob VandenBrink bought something from the store. He later found his own credit card number buried in its systems, a major worry.The retailer, which has hundreds of stores across Cana…
    - 7 hours ago Tuesday, September 2, 2014 -
  • CryptoWall held over half-a-million computers hostage, encrypted 5 billion files
    A file-encrypting ransomware program called CryptoWall infected over 600,000 computer systems in the past six months and held 5 billion files hostage, earning its creators more than US$1 million, researchers found.The Counter Threat Unit (CTU) at Del…
    - 4 days ago Friday, August 29, 2014 -
  • Feds probing possible hacking incident at JP Morgan Chase
    On Wednesday, Bloomberg reported that the FBI, the US Secret Service, and even the NSA are investigating an incident alleged to have occurred in mid-August on JPMorgan Chase's (JPMC) network.According to the news agency, Russian hackers breached the…
    - 5 days ago Thursday, August 28, 2014 -
  • Retailers urged to defend against 'Backoff' point-of-sale malware
    A payment card industry security consortium warned retailers on Wednesday of the urgency to secure their systems against "Backoff," a malicious software program that steals card numbers.Backoff "represents a very real threat to the security of card…
    - 5 days ago Thursday, August 28, 2014 -
  • Three security practices that IoT will disrupt
    I made it back from DEFCON with both my phone and tablet intact, but I’m happy I didn’t bring a light bulb. You see, if had brought a light bulb, and that light bulb was a smart LED bulb running Linux, it might be running someone else’s softwar…
    - 6 days ago Wednesday, August 27, 2014 -
  • New malvertising campaign hit visitors of several high-profile sites
    Some visitors to several high-profile websites last week were redirected to browser exploits that installed malware on their computers because of malicious advertisements on those sites.The attack affected visitors to Java.com, Deviantart.com, TMZ.…
    - 6 days ago Wednesday, August 27, 2014 -
  • Toss routers with hardcoded passwords, expert says
    Sometimes it is best to toss security-challenged technology, and that's the recommendation experts are giving to small businesses using a flawed router from a China-based manufacturer.Trend Micro reported this week that routers sold under the brand n…
    - 6 days ago Tuesday, August 26, 2014 -
  • Attack targets firms from the automobile industry in Europe
    Cybercriminals are using a new information-stealing malware program to target companies from the automobile industry in Europe, security researchers warned.The attack campaign started in early August and primarily targeted rental, insurance, transp…
    - 8 days ago Monday, August 25, 2014 -
  • Lessons learned from UPS Store breach
    The security breach discovered at a few dozen franchises of the UPS Store, a subsidiary of United Parcel Service, provides a number of lessons for other retailers.The UPS Store reported Wednesday that malicious software was found within the in-store…
    - 11 days ago Thursday, August 21, 2014 -
  • NIST taking input for mobile security guidelines
    The U.S. National Institute of Standards and Technology (NIST) is developing a guide for testing third-party apps to ensure that they are secure and don't introduce any vulnerabilities.The government agency has prepared a draft of its recommendations…
    - 12 days ago Thursday, August 21, 2014 -
  • The UPS Store says malware found on systems of 51 stores
    The UPS Store said Wednesday that malicious software was found on the systems of 51 of its franchises in 24 U.S. states, although no fraud has been detected yet.The subsidiary of United Parcel Service, which has 4,470 U.S. stores, said in a notice th…
    - 12 days ago Thursday, August 21, 2014 -
  • 'Reveton' ransomware upgraded with powerful password stealer
    A type of malware called Reveton, which falsely warns users they've broken the law and demands payment of a fine, has been upgraded with powerful password stealing functions, according to Avast.Reveton is in a class of nasty programs known as "ransom…
    - 13 days ago Wednesday, August 20, 2014 -
  • Heartbleed to blame for Community Health Systems breach
    According to a blog post from TrustedSec, an information security consultancy in Ohio, the breach at Community Health Systems (CHS) is the result of attackers targeting a flaw OpenSSL, CVE-2014-0160, better known as Heartbleed.The incident marks th…
    - 14 days ago Tuesday, August 19, 2014 -
  • SDS still young, but very much on the rise
    Anything “software-defined”—networks, storage, data centers—is grabbing a lot of attention these days. Security is no exception. Software-defined security (SDS) is an emerging model in which information security is deployed, controlled and ma…
    - 15 days ago Monday, August 18, 2014 -
  • How a portable travel router can put TOR web-surfing security in your pocket
    Most of the stories coming out the Black Hat and Def Con security conferences highlight the latest crop of horrendous security flaws discovered by hackers. But it's not all doom and gloom. There were also presentations from developers actively trying…
    - 18 days ago Friday, August 15, 2014 -
  • New Gameover Zeus botnet keeps growing, especially in the US
    Cybercriminals are in the process of rebuilding the Gameover Zeus (GOZ) botnet, which law enforcement authorities took over in June, and recent research suggests that they've had some success, especially in the U.S.The original GOZ botnet was built…
    - 19 days ago Thursday, August 14, 2014 -
  • The biggest iPhone security risk could be connecting one to a computer
    Apple has done well to insulate its iOS mobile operating system from many security issues, but a forthcoming demonstration shows it's far from perfect.Next Wednesday at the Usenix Security Symposium in San Diego, researchers with the Georgia Institut…
    - 19 days ago Thursday, August 14, 2014 -
  • BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software
    BlackBerry's focus on strong security as a key differentiator for its devices does not mean that they're completely free of flaws. The company released security updates Tuesday for both the OS running on its smartphones and for its enterprise server…
    - 20 days ago Wednesday, August 13, 2014 -
  • Users should patch critical flaw in Adobe Reader and Acrobat, researchers say
    Adobe Systems has released security patches for its Flash Player, Reader and Acrobat products, addressing a total of eight vulnerabilities, including one that is being exploited by attackers.The actively exploited flaw affects Adobe Reader and was fo…
    - 20 days ago Wednesday, August 13, 2014 -
  • Sisters in Security: Katie Moussouris' Leaps of Faith
    Katie Moussouris is a hacker, a developer, and penetration tester. She is curious and passionate about making a difference in the world. And she keeps finding new roles and new challenges.
    - -
  • Make Passwords Strong And Long
    Using a random mix of characters in your password won't protect against a brute-force hash-cracking attack. What does work? Making your password long, very long.
    - -
  • Giant Internet Explorer Patch in August Patch Tuesday
    Microsoft fixed 37 vulnerabilities in Internet Explorer and in supported versions of Windows as part of its August Patch Tuesday release.
    - -
  • Mobile Threat Monday: Android App Uninstaller Reads Your Texts
    This week, Malwarebytes points us to an app that disguises itself as an uninstaller utility. Such apps are handy enough, but this one actually steals all your SMS messages and forwards them to parts unknown.
    - -
  • Can Your Security Software Block Exploit Attacks?
    A security suite that does a great job protecting against malware may flop when it comes to defending against attacks that target vulnerabilities in the victim PC. Which ones are best at fending off this particular type of attack?
    - -
  • Why Was Nike at Black Hat?
    One thing I learned at Black Hat last week was that information security isn't just for tech companies, anymore. Nike cares about it, too
    - -
  • Airport Scanners Have Account Backdoors, Default Passwords
    Many of the machines deployed at airport security checkpoints have embedded accounts with default passwords that can be abused, Billy Rios, director of threat intelligence at Qualys, told attendees at the Black Hat conference on Wednesday. In this ca…
    - -
  • How to Tell If The Spies Are Watching You, for Cheap
    The government has tons of money to fund its survillance programs. If its snoops really wants to find out what you are up to, it has almost infinite amounts of resources at its disposal. A university professor described to DEF CON attendees how the o…
    - -
  • Criminal Data Exchanges Offer Great Customer Service Experience
    It's bad enough when our personal and financial information gets exposed during a data breach. It's adding insult to injury when we become identity theft victims because some other criminal got their hands on the information and had a shopping spree.
    - -
  • Hackers Go After Rachel
    Rachel is the most prolific robocall bot currently operating in the United States according to the Federal Trade Commission. The FTC is offering $17,000 in prize money to hackers who help the agency find the telemarketers behind Rachel.
    - -
  • Hacking the Lights in a Luxury Hotel
    During a stay in the St. Regis in Shenzhen, China, Jesus Molina, an independent security consultant and former chair of the Trusted Computing Group, successfully hacked the controls of 200 rooms in the luxury hotel using an iPad.
    - -
  • Exploit kits put Silverlight security issues in focus
    Silverlight security issues will demand more attention as attackers increasingly target the plug-in, leaving users vulnerable to various exploits.
    - 15 days ago Monday, August 18, 2014 -
  • Amazon Fire Phone security features and pitfalls
    The Amazon Fire Phone has the potential to ignite interest among enterprise users, but are security issues lurking beneath its shiny façade? Expert Lisa Phifer reviews the Fire Phone's security features and shortcomings.
    - 15 days ago Monday, August 18, 2014 -
  • Internet of Things security issues rise to the fore at Black Hat
    If nothing else, this year's Black Hat showed that Internet of Things security issues are going to demand increased attention in the near future.
    - 18 days ago Friday, August 15, 2014 -
  • Insider security threats: Negligence is a data loss double bogey
    News roundup: Pro golfer Rory McIlroy inadvertently revealed his passcode on live TV, highlighting how easy it is to inadvertently reveal sensitive information. Plus: BlackBerry and Google issue updates, and Gartner hit with Magic Quadrant lawsuit.
    - 18 days ago Friday, August 15, 2014 -
  • Common bypasses found in mobile application management products
    Crypto failures enable attackers to bypass mobile application management products, according to a researcher, leaving sensitive mobile data unprotected and casting doubts on MAM's value.
    - 19 days ago Thursday, August 14, 2014 -
  • Amazon Workspaces gets MFA security update
    Amazon Web Services has added multifactor authentication to its WorkSpaces cloud desktop service, the first step in a larger effort to bolster AWS security.
    - 20 days ago Wednesday, August 13, 2014 -
  • Gartner on PCI DSS 3.0 changes: Bigger, harder and more expensive
    Gartner analyst Avivah Litan discusses how Gartner clients are reacting to the changes in PCI DSS 3.0, and whether the increased rigor in the standard will prove beneficial to enterprises.
    - 20 days ago Tuesday, August 12, 2014 -
  • August 2014 Patch Tuesday targets IE security improvements
    Beyond the usual slew of IE security patches, Microsoft's August 2014 Patch Tuesday made a couple of moves to improve the security of its browser.
    - 21 days ago Tuesday, August 12, 2014 -
  • IBM ups cloud IAM offering with Lighthouse acquisition
    IBM made its second cloud security acquisition in as many weeks with the purchase of Lighthouse Security Group, which specializes in cloud-based IAM services.
    - 21 days ago Tuesday, August 12, 2014 -
  • Black Hat 2014 session debuts BadUSB
    Do USB drives pose a major threat to enterprise security? Experts at a recent A Black Hat 2014 session have unveiled a new threat -- dubbed BadUSB -- that could infiltrate your network using common USB devices.
    - 22 days ago Monday, August 11, 2014 -
  • Parental Controls For YouTube
    Kids seem to be glued to YouTube these days. As a parent, it can be daunting to try and police the content that they watch. What's a parent to do?In our featured article: YouTube Parental Controls...Read Full Post
    - 94 days ago Saturday, May 31, 2014 -
  • Craigslist Safety and Security Tips
    Craigslist can be both a fun and scary place. You never know what you'll find for sale, and you often don't know who is on the other end of that sale until you complete the deal....Read Full Post
    - 94 days ago Saturday, May 31, 2014 -
  • 5 Tips to Help You Land an IT Security Job
    IT security jobs are still in high demand, especially given the fact that cyber crime seems to be a constant fixture in the news with data breaches becoming an almost daily occurrence....Read Full Post
    - 94 days ago Saturday, May 31, 2014 -
  • How to Avoid Becoming a Victim of the iPhone Lock Ransom Scam
    There is a new scam sweeping through Australia and other parts of the world this week. Victims are having their iPhones locked remotely by hackers who apparently compromised their iCloud account credentials. The victims are then being issued ransom d…
    - 94 days ago Saturday, May 31, 2014 -
  • Are Your Employees Leaking Sensitive Company Information on Facebook?
    Like it or not, Facebook is here to stay. Some companies allow employees to use Facebook at work and some strictly prohibit it. If your company allows it then you might want to continue reading....Read Full Post
    - 96 days ago Thursday, May 29, 2014 -
  • Rev up Your Security with a 10-minute PC Security Tune-up
    Securing your PC doesn't have to take hours and hours of your time. There are a lot of things you can do in just a few minutes to help improve your security posture....Read Full Post
    - 96 days ago Thursday, May 29, 2014 -
  • How to Prevent Your Web Browser From Being Hijacked
    Did you just try to Google something but instead of going to Google, your browser took you to some strange search engine you've never heard of?You might have just become a victim of browser hijacking. In this week's featured article: How to Prevent…
    - 97 days ago Wednesday, May 28, 2014 -
  • Are Your Clicks Getting Jacked?
    Have you ever been clickjacked? While it may sound like some kind of pro wrestling move, I assure you it is not.Clickjacking is a security threat that users all over the world are experiencing. How can you stay safe from clickjacking? Check out our…
    - Wednesday, April 30, 2014 -
  • Is Your Google+ Account Secure?
    Google+ seems to be slowly gaining some traction. It's probably not quite the big Facebook contender that Google had hoped it would be, but it is gaining steamJust like Facebook, Google+ has privacy and security settings that you should configure t…
    - Wednesday, April 30, 2014 -
  • If Your PC Was Just Hacked, Read This:
    You've just discovered that your PC has been hacked. You could run away and go hide in a corner, or you can take action and do something about it.If you opt for taking action, then you need to check out our article: I've Been Hacked! Now What? We'l…
    - Wednesday, April 30, 2014 -
  • newLogRhythm Launches Threat Intelligence Ecosystem
    Several vendors have joined forces with LogRhythm on a threat intelligence collective designed to provide customers with visibility and insight in order to help them detect sophisticated cyber threats.read more
    - 2 days ago Saturday, August 30, 2014 -
  • newUS Cyber-Warriors Battling Islamic State on Twitter
    WASHINGTON - The United States has launched a social media offensive against the Islamic State and Al-Qaeda, setting out to win the war of ideas by ridiculing the militants with a mixture of blunt language and sarcasm. read more
    - 2 days ago Saturday, August 30, 2014 -
  • Feedback Friday: JPMorgan Targeted in Alleged Russian Cyberattack - Industry Reactions
    Federal authorities in the United States are investigating reports of cyberattacks launched against JPMorgan Chase and at least one other unnamed financial institution.read more
    - 4 days ago Friday, August 29, 2014 -
  • 97,000 Bugzilla Testers' Data Dumped on Public Server
    Mozilla is warning users who have contributed to testing builds of the online bug-tracking tool Bugzilla that their email addresses and encrypted passwords were publicly available for a period of three months. read more
    - 4 days ago Friday, August 29, 2014 -
  • Many Wi-Fi Connections in Brazil Vulnerable to MitM Attacks: Researcher
    A large number of the wireless Internet connections in Brazil are exposed to man-in-the-middle (MitM) attacks because they're not secured properly, a researcher has warned.read more
    - 4 days ago Friday, August 29, 2014 -
  • Cyber Attacks on US Businesses, Banks Mounting
    NEW YORK - Investigators were digging Thursday to find who initiated and what was taken in an apparent intense hacker effort this month to penetrate the systems of US banks including JPMorgan Chase. read more
    - 4 days ago Friday, August 29, 2014 -
  • Creative Disruption and Complacency Vie to Shape US Cyber Defenses
    Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.read more
    - 4 days ago Friday, August 29, 2014 -
  • Ethics in Security: Less About Technology, More About Choice
    On August 15th, 2014, the Washington Post published an article by Barton Gelman which revealed that a modified version of a network defense tool created by CloudShield Technologies was likely used by an unknown number of intelligence agencies outside…
    - 4 days ago Friday, August 29, 2014 -
  • Cybercriminals Attempt to Revive Srizbi Spam Botnet
    Srizbi, once considered one of the most powerful botnets, is apparently trying to make a comeback with the aid of a new piece of malware, F-Secure reported.read more
    - 5 days ago Thursday, August 28, 2014 -
  • Skyfence Launches Free Cloud App Usage Visibility Tool
    Skyfence, a cloud security gateway startup acquired by Imperva earlier this year, announced on Tuesday the availability of a free tool designed to provide organizations visibility into cloud app usage and risks.read more
    - 5 days ago Thursday, August 28, 2014 -
  • Report Examines Unanswered Questions Around Target Attack
    Cybersecurity startup Aorato has published a report around the data breach suffered in 2013 by Target, which investigates some of the techniques used by the attackers to gain access to the company's networks.read more
    - 5 days ago Thursday, August 28, 2014 -
  • PCI Security Standards Council Urges Retailers Take Action Against Point-of-Sale Malware
    The Payment Card Industry (PCI) Security Standards Council is encouraging retailers to take steps to better protect themselves from the Backoff point-of-sale (PoS) malware that has been tied to attacks on 1,000 organizations.read more
    - 5 days ago Thursday, August 28, 2014 -
  • In the "Security Court," Double Jeopardy is Dead
    In the criminal courts double jeopardy prohibits anyone from being tried twice for the same crime. Innocent or guilty, the verdict stands. Prosecutors are forced to gather as much evidence as they can and determine if they have a case for conviction.…
    - 5 days ago Thursday, August 28, 2014 -
  • JPMorgan Working With FBI in Cyber-Attack Probe
    NEW YORK - JPMorgan Chase said Thursday that it was cooperating with law-enforcement officials to determine the scale of reported cyber attacks against US financial institutions. The largest US bank by assets said it was not seeing any sign of unusu…
    - 5 days ago Thursday, August 28, 2014 -
  • Netflix Releases Internally Developed Security Tools
    Netflix has released two applications used by the company's security team to monitor the Web for potential threats.read more
    - 5 days ago Thursday, August 28, 2014 -
  • Microsoft Re-Releases Windows Security Update Pulled After Complaints
    Microsoft has fixed and reissued a patch released earlier this month that left some users with the infamous 'Blue Screen of Death.'The patch in question is MS 14-045, which was released earlier this month as part of the Patch Tuesday update. After c…
    - 6 days ago Wednesday, August 27, 2014 -
  • Russian Hackers Attacked JPMorgan: Reports
    NEW YORK - Hackers believed to be from Russia broke into the computer systems of JPMorgan Chase and a second US bank earlier this month, sparking a federal investigation, US media reported Wednesday. read more
    - 6 days ago Wednesday, August 27, 2014 -
  • Java.com, Other High-Profile Sites Hit by Malvertising Attack
    A major online advertising company has been serving malicious ads on several high-profile websites, Fox-IT reported on Wednesday.read more
    - 6 days ago Wednesday, August 27, 2014 -
  • IEEE Report Reveals Top 10 Software Security Design Flaws
    The IEEE (Institute of Electrical and Electronics Engineers) Center for Secure Design has published some advice to help software developers dodge common mistakes that compromise security.read more
    - 6 days ago Wednesday, August 27, 2014 -
  • Former HHS Cybersecurity Director Convicted on Child Porn Charges
    Following a four-day trial, a federal jury in Nebraska convicted the former acting director of cybersecurity at the United States Department of Health and Human Services (HHS) for his involvement in a child pornography enterprise, the Department of J…
    - 6 days ago Wednesday, August 27, 2014 -
  • Pro tip: Manage privacy settings in iOS
    iOS privacy settings give you fine-grain control over what applications can access certain system services. Cory Bohon shows you how to configure the settings to protect your privacy.
    - 13 days ago Wednesday, August 20, 2014 -
  • How to survive data breaches
    Data breaches are fast becoming a fact of digital life. The WEF offers a way to recover if one happens to hit.
    - 15 days ago Monday, August 18, 2014 -
  • Use free tools to monitor abnormal behavior
    Sometimes, the best security practices start with looking for trouble, instead of waiting for trouble to find you.
    - 21 days ago Tuesday, August 12, 2014 -
  • Google turns in a user for allegedly possessing criminal material
    Find out how Google detected illegal activity on their systems and how they responded to the discovery.
    - 21 days ago Tuesday, August 12, 2014 -
  • No surprise, IoT devices are insecure
    One might assume past mistakes regarding the security of networked devices would be addressed when building the Internet of Things. And one would be wrong.
    - 22 days ago Monday, August 11, 2014 -
  • OpenSSL Patches Nine Vulnerabilities
    Original release date: August 07, 2014OpenSSL has released updates patching nine vulnerabilities, some of which may allow an attacker to cause a Denial of Service (DoS) condition or force the client to revert to a less secure Transport Layer Security…
    - 26 days ago Thursday, August 7, 2014 -
  • Cisco EnergyWise Module Vulnerability
    Original release date: August 06, 2014Cisco has released an advisory to address a vulnerability in the EnergyWise module of Cisco IOS and Cisco IOS XE Software. Exploitation of the vulnerability could allow an unauthenticated, remote attacker to caus…
    - 27 days ago Wednesday, August 6, 2014 -
  • Local Privilege Escalation Vulnerability in Symantec Endpoint Protection
    Original release date: August 04, 2014US-CERT is aware of a local privilege escalation vulnerability in Symantec Endpoint Protection. This vulnerability affects all versions of Symantec Endpoint Protection Client 11.x and 12.x running Application and…
    - 29 days ago Monday, August 4, 2014 -
  • Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird
    Original release date: July 22, 2014The Mozilla Foundation has released security updates to address multiple vulnerabilities in Firefox, Firefox ESR, and Thunderbird, some of which may allow attackers to execute arbitrary code.The following updates a…
    - 42 days ago Tuesday, July 22, 2014 -
  • CPNI Releases Paper on Improving Defenses Against Targeted Attack
    Original release date: July 22, 2014The United Kingdom's Centre for the Protection of National Infrastructure (CPNI) has released a report on its “Improving Defenses Against Targeted Attack" (iDATA) cyber research program. The report contains descr…
    - 42 days ago Tuesday, July 22, 2014 -
  • Vulnerabilities in LZO and LZ4 compression libraries
    Original release date: July 21, 2014Recently disclosed vulnerabilities in the LZO and LZ4 compression libraries could allow remote code execution under certain circumstances. While these libraries are used by a large number of platforms and applicati…
    - 43 days ago Monday, July 21, 2014 -
  • Cisco Addresses Wireless Residential Gateway Vulnerability
    Original release date: July 16, 2014Cisco has released an advisory to address a vulnerability in the web server used in multiple Wireless Residential Gateway products that could allow an unauthenticated, remote attacker to crash the web server and ex…
    - 48 days ago Wednesday, July 16, 2014 -
  • Oracle Releases July 2014 Security Advisory
    Original release date: July 15, 2014Oracle has released its Critical Patch Update for July 2014 to address 113 vulnerabilities across multiple products.This update contains the following security fixes:5 for Oracle Database Server29 for Oracle Fusion…
    - 49 days ago Tuesday, July 15, 2014 -
  • Microsoft Releases Security Advisory for Improperly Issued Digital Certificates
    Original release date: July 10, 2014Microsoft has released a security advisory to address improperly issued SSL certificates that could be used in attempts to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. This issue a…
    - 54 days ago Thursday, July 10, 2014 -
  • Cisco Addresses Apache Struts 2 Vulnerability
    Original release date: July 09, 2014Multiple Cisco products include an implementation of Apache Struts 2 which contains a vulnerability that could allow an unauthenticated, remote attacker to bypass security restrictions and execute arbitrary command…
    - 55 days ago Wednesday, July 9, 2014 -
  • Дураки на экранах

    - Saturday, December 13, 2008 -
  • Казаки-разбойники

    - Wednesday, December 10, 2008 -
  • 22
    Привет.Сегодня 22.Сегодня госстат установил инфляцию на уровне почти 22%.Через 22 дня Новый Год!Конечно настроение не праздничное: кризис, р…
    - Monday, December 8, 2008 -
  • Маразм крепчал
    Привет.Государственный комитет статистики сообщил, что в октябре доходы населения сократились на 1% по сравнению с сентябрем до 77 627 млн.…
    - Friday, December 5, 2008 -
  • Защити себя сам
    Привет.Сокращения на многих промышленных предприятиях и массовое обналичивание всех вкладов привело к росту краж и грабежей.Наша добле…
    - Thursday, December 4, 2008 -
  • Спасите отечественного автопроизводителя
    Привет.Продолжаем наблюдать за кризисом. Очень интересно сравнивать действия в разных государствах.В нашей стране хотят ввести дополни…
    - Thursday, December 4, 2008 -
  • Шоу маст гоу вон
    Привет.Шоу под названием "антикризис в Украине" продолжается.Комментарии.net пишут, что министр финансов предлагает навязать всем банкам…
    - Wednesday, December 3, 2008 -
  • Вот такой у нас футбол
    Привет.Не запланированная заметка.Случайно зашел на Корреспондент.net:Вот такой у нас футбол: УЕЫИ на это все уже было 53 комментария.Посто…
    - Wednesday, December 3, 2008 -
  • Доллар гудбай...
    Привет.Наша страна (Украина) - оплот свободы и демократии.Сейчас многие говорят о конце доллара США - переход стран Северной Америки на ед…
    - Wednesday, December 3, 2008 -
  • Итоги ноября
    Привет.Давно я не проводил анализа входящего трафика. Сегодня подводим итоги ноября 2008 года. Общее число посещений 1038, посещено страниц -…
    - Tuesday, December 2, 2008 -
  • Пришла зима - пропала "зелень"
    Привет.В нашем "замечательном" государстве в течение последних нескольких лет национальная валюта была "жестко" привязана к национально…
    - Monday, December 1, 2008 -
  • А кто считает расходы на эксплуатацию?

    - Friday, November 28, 2008 -
  • Мой дом - моя крепость
    Привет.В нашем регионе кризис продолжает бушевать. Количество безработных (реальных) растет. Людей могут и не сокращать, но отправляют в…
    - Friday, November 28, 2008 -
  • И эти люди запрещают мне в носу ковыряться

    - Tuesday, November 25, 2008 -
  • Кризис не хотят замечать
    Привет.Кризис бушует. Предприятия сокращают свой штат. Многих отправляют в "бесплатные" отпуска. Многим задерживают зарплаты. Многим офи…
    - Monday, November 24, 2008 -