• newSpace Explorers Hole Up in Hawaii to Simulate Life on Mars
    The third in a series of four simulated missions to Mars planned by NASA kicked off last week at a remote site on the Hawaiian island of Mauna Loa. A six-person team, comprising the Hawai'i Space Exploration Analog and Simulation 3 mission, is inhabi…
    - 2 hours ago Thursday, October 23, 2014 -
  • newApple Is Confusing Tablet Leadership With Awesomeness
    The new super thin iPad Air 2 is starting to get tepid reviews, most of which begrudgingly call it the "best tablet" in the market, while admitting it's boring. Instead of talking up all the great things about how it makes their lives better or fun,…
    - 10 hours ago Thursday, October 23, 2014 -
  • newReading and Writing and Open Source
    Digital textbooks with open-licensed content -- and sometimes even complete open source textbooks -- are starting to change the way students and teachers interact with subject material. The budget-busting prices of traditional printed textbooks and t…
    - 22 hours ago Wednesday, October 22, 2014 -
  • newSmart Nightlight Calls Your iPhone When Smoke, CO Alarms Start Wailing
    Leeo on Tuesday introduced the Smart Alert Nightlight, a $99 gadget that can detect when the alarm sounds from a smoke or carbon monoxide detector and send alerts to an iPhone. About the size and shape of a coaster, the Smart Alert Nightlight plugs…
    - 1 day ago Wednesday, October 22, 2014 -
  • newThe Next-Gen TV Cable Dilemma
    Television manufacturers are moving toward ultra high definition -- also known as "4K" -- which offers four times the resolution of HD. It also offers greater depth of color and faster frame rate. That means more information must travel through the c…
    - 1 day ago Wednesday, October 22, 2014 -
  • newGoogle Takes a Flyer on Magic Leap
    Magic Leap on Tuesday announced that Google was the lead investor in a $542 million round of funding for its secret endeavors. Also participating were Qualcomm, Legendary Entertainment, KKR, Vulcan Capital, Kleiner Perkins Caufield & Byers, Andreesse…
    - 2 days ago Tuesday, October 21, 2014 -
  • new$10K Will Get You a Clunky, Slow Hoverboard That's Nothing Like Marty McFly's
    The designers behind the Hendo Hoverboard on Tuesday took to the crowdfunding site Kickstarter to help launch a prototype and bring it to actual production. The funding period for this project will run from Tuesday through Dec. 15. The team has set a…
    - 2 days ago Tuesday, October 21, 2014 -
  • newChinese Officials Kick In Apple, MS Cloud Doors
    Chinese authorities have launched man-in-the-middle attacks on Apple's iCloud.com and Microsoft's Login.live.co that are ongoing, according to Greatfire.org. Qihoo 360 browser users' local connections to iCloud.com are being rerouted to a dummy site…
    - 2 days ago Tuesday, October 21, 2014 -
  • newKickstarter Puts Kibosh on Tor-Based Router Funding
    Kickstarter on Friday suspended a crowdfunding campaign for Anonabox, a portable networking device designed specifically to run Tor. The campaign for the privacy-minded router, which launched earlier last week, was wildly successful. In just a few da…
    - 2 days ago Tuesday, October 21, 2014 -
  • newBlack Box Keeps Cybersnoops in Dark
    Following Edward Snowden's revelations about indiscriminate government snooping on U.S. citizens, many Net surfers would like to find a way to lower their visibility on the Internet. There are a number of tools in cyberspace that can help a soul do t…
    - 3 days ago Tuesday, October 21, 2014 -
  • FBI's Comey Argues Against Encryption: Trust Us
    FBI director James Comey, in a speech last week at the Brookings Institute, reiterated his concerns about encryption built into iOS 8 and Android stymieing law enforcement. "I'm a huge believer in the rule of law, but I also believe that no one in t…
    - 3 days ago Monday, October 20, 2014 -
  • newThe Bash Vulnerability: How to Protect your Environment
    A recently discovered hole in the security of the Bourne-Again Shell (bash) has the majority of Unix/Linux (including OS X) admins sweating bullets. You should be, too--attackers have already developed exploits to unleash on unpatched web servers, ne…
    - 10 hours ago Thursday, October 23, 2014 -
  • newMicrosoft PowerPoint Vulnerable to Zero-Day Attack
    It seems that there is no end to the Windows zero-days, as recently Microsoft patched three zero-day vulnerabilities in Windows which were actively exploited in the wild by hackers, and now a new Zero-day vulnerability has been disclosed affecting al…
    - 2 days ago Wednesday, October 22, 2014 -
  • newGoogle Launches USB-Based "Security Key" To Strengthen 2-Step Verification
    Google is taking its users’ privacy very serious and making every possible effort for its users just to make them feel secure when they are online. Today, the tech giant has announced its enhanced two-step verification service that is based on…
    - 2 days ago Wednesday, October 22, 2014 -
  • newGoogle Search Algorithm to Demote Piracy Sites In Search Results
    The Search Engine giant is not going to spare the Pirated content providing sites. Google is ready to fulfill its commitment to downgrade the search rankings of ‘notorious’ piracy sites globally that often rank above legal and commercial sites.…
    - 2 days ago Wednesday, October 22, 2014 -
  • newMac OS X 10.10 Yosemite Sends User Location and Safari Search Data to Apple
    Apple's latest desktop operating system, known as Mac OS X 10.10 Yosemite, sends location and search data of users without their knowledge to Apple's remote servers by default whenever a user queries the desktop search tool Spotlight, which questions…
    - 3 days ago Tuesday, October 21, 2014 -
  • newChinese Government Executes MITM Attack against iCloud
    Apple iCloud users in China are not safe from the hackers — believed to be working for Chinese government — who are trying to wiretap Apple customers in the country. Great Fire, a reputed non-profit organization that monitors Internet censors…
    - 3 days ago Tuesday, October 21, 2014 -
  • 7 Things About Android Lollipop 5.0 You Need To Know
    After offering chocolate (Kit-Kat), now Google is ready to serve you Lollipops. Google on Wednesday finally revealed the official name of its next version Android L — Android 5.0 Lollipop. The newly released Android 5.0 Lollipop ships with the…
    - 5 days ago Saturday, October 18, 2014 -
  • Privacy Tools — Tor Browser 4.0 and Tails 1.2 Update Released
    Tor - Privacy oriented encrypted anonymizing service, has announced the launch of its next version of Tor Browser Bundle, Tor version 4.0, which disables SSL3 to prevent POODLE attack and uses new transports that are intended to defeat the Great Fire…
    - 6 days ago Saturday, October 18, 2014 -
  • Reflection DDoS Attacks Using Millions of UPnP Devices on the Rise
    After successful in launching reflection and amplification Distributed Denial-of-Service (DDoS) attacks by abusing various protocols such as DNS, NTP and SMTP, hackers are now abusing Simple Service Discovery Protocol (SSDP) – part of the UPnP prot…
    - 7 days ago Friday, October 17, 2014 -
  • Hacking Smart Electricity Meters To Cut Power Bills
    Smart devices are growing at an exponential pace with the increase in connecting devices embedded in cars, retail systems, refrigerators, televisions and countless other things people use in their everyday life, but security and privacy are the key i…
    - 7 days ago Friday, October 17, 2014 -
  • Facebook “Safety Check” Allows You to Connect with Family during Natural Disasters
    Facebook is moving a step ahead from others and making its social media service as an information sharing platform in serious situations as well. The social networking giant has announced a new tool, which lets users notify their family and friends t…
    - 8 days ago Thursday, October 16, 2014 -
  • Microsoft Patches 3 Zero-day Vulnerabilities actively being Exploited in the Wild
    As part of monthly patch update, Microsoft released eight security bulletins on Tuesday that address dozens of vulnerabilities including a zero-day flaw reportedly being exploited by Russian hackers to target NATO computers and a pair of zero-day Win…
    - 9 days ago Wednesday, October 15, 2014 -
  • POODLE SSL 3.0 Attack Exploits Widely-used Web Encryption Standard
    Another Heartbleed-like vulnerability has been discovered in the decade old but still widely used Secure Sockets Layer (SSL) 3.0 cryptographic protocol that could allow an attacker to decrypt contents of encrypted connections to websites. Google's S…
    - 9 days ago Wednesday, October 15, 2014 -
  • Nearly 7 Million Dropbox Account Passwords Allegedly Hacked
    Internet users have faced a number of major privacy breaches in last two months. Major in the list are The Fappening, The Snappening and now the latest privacy breach in Dropbox security has gained everybody’s attention across the world. Dropbo…
    - 9 days ago Tuesday, October 14, 2014 -
  • Microsoft Windows Zero-Day Vulnerability "CVE-2014-4114" Used to Hack NATO
    Once again a Russian cyber espionage group has gained media attention by exploiting a Zero-day vulnerability in Microsoft’s Windows operating system to spy on the North Atlantic Treaty Organization (NATO), Ukrainian and Polish government agencies,…
    - 10 days ago Tuesday, October 14, 2014 -
  • SEANux — Syrian Electronic Army To Release its Own Linux-based Distribution
    Lots of Linux distributions are offered free of cost on the Internet by a number of companies, non-commercial organizations and by many individuals as well, and now, the notorious Syrian Electronic Army (SEA) has announced their own Linux distributio…
    - 10 days ago Monday, October 13, 2014 -
  • Core Secrets — NSA Used ‘Undercover Agents’ In Foreign Companies
    Sometimes we wonder that how the National Security Agency (NSA) reached such a wide range of its Surveillance operation across the world – which you can measure from several secret documents released by the former NSA contractor Edward Snowden.…
    - 11 days ago Sunday, October 12, 2014 -
  • The Snappening — Snapchat Hacker Threatens to Leak thousands of Nude Images
    The waves of celebrities nude photos have not yet stopped completely, and a new privacy threat has emerged exposing tens of thousands of private photographs and videos of innocent users are circulating over the Internet.The personal image that ar…
    - 13 days ago Saturday, October 11, 2014 -
  • Authentication Flaw in PayPal mobile API Allows Access to Blocked Accounts
    Payment services provider PayPal is vulnerable to an authentication restriction bypass vulnerability, which could allow an attacker to bypass a filter or restriction of the online-service to get unauthorized access to a blocked users’ PayPal accoun…
    - 14 days ago Friday, October 10, 2014 -
  • iOS 8 'Date Trick' Loophole Allows Play Nintendo Games Using Emulators
    If you are a retro games lover and want to play it on your iPhone, a security loop in iOS 8 makes it possible for you to play classic SNES games on your iPhone, without the need to jailbreak your Apple devices.Since Apple doesn’t allow emulator…
    - 15 days ago Thursday, October 9, 2014 -
  • SQL Injection Vulnerability in 'Yahoo! Contributors Network'
    Yahoo! Contributors Network (contributor.yahoo.com), the network of authors that generated the contents such as photographs, videos, articles and their knowledge to more than 600 million monthly visitors, was vulnerable to a Time based Blind SQL Inje…
    - 15 days ago Thursday, October 9, 2014 -
  • "Pakistan People's Party" Website Hacked — Message for Bilawal Bhutto
    On Tuesday, Indian and Pakistani army forces continued to exchange fire along the Line of Control (LoC) in Jammu and Kashmir, which was started when Pakistan’s military fired machine guns and mortars at about 60 Indian army posts during last week.…
    - 16 days ago Wednesday, October 8, 2014 -
  • Tyupkin Malware Hacking ATM Machines Worldwide
    Money is always a perfect motivation for cyber criminals who tries different tricks to solely target users with card skimmers that steal debit card numbers, but now the criminals are using specialized malware that targets ATM (Automated Teller Machin…
    - 16 days ago Wednesday, October 8, 2014 -
  • The Fappening 4 — More Celebrity Nude Photos Leaked Online
    Week passed, and here comes the fourth wave of celebrity nude photos leak, revealing its first male victim. As part of the Fappening 4, 24-year-old Nick Hogan, the son of ex-wrestler Hulk Hogan has become the first male celebrity to fall victim to th…
    - 17 days ago Tuesday, October 7, 2014 -
  • Zero-Day in Bugzilla Exposes Zero-Day Vulnerabilities to Hackers
    A critical zero-day vulnerability discovered in Mozilla’s popular Bugzilla bug-tracking software used by hundreds of prominent software organizations, both private and open-source, could expose sensitive information and vulnerabilities of the softw…
    - 17 days ago Tuesday, October 7, 2014 -
  • newHackers Ran Loose Inside JPMorgan For 2 Months Before Getting Caught
    It's as if a robber were to break into a bank today and stay there until Christmas before someone noticed.That's how long hackers had access to JP... Read more: JPMorgan Chase Cyberattack, Jpmorgan, JPMorgan Chase Breach, Home Depot Bre…
    - 16 hours ago Thursday, October 23, 2014 -
  • newJasmina Tesanovic: DokuFest: Prizren 2014
    ... Read more: Activism, Hackers, Prizren, SHARE Foundation, Kosovo, Bruce Sterling, Impact News
    - 18 hours ago Thursday, October 23, 2014 -
  • newCreditSesame.com: The Dawn of World War IV: America Under Cyber Attack
    Einstein was wrong. World War IV will not be fought with sticks or rocks. It will be fought with bits and bytes, Trojans and bots, APTs and zero-days -- it's already started and we're already losing. Read more: Identity Theft, Cyberattac…
    - 2 days ago Wednesday, October 22, 2014 -
  • newPaul Kleinschnitz: The Cybersecurity Prescription For Small And Growing Businesses
    Just as diet and exercise, regular doctor visits and health insurance are critical elements of a holistic plan to keep your body healthy, there are important steps that small business owners can take to vaccinate their business against infection, str…
    - 2 days ago Tuesday, October 21, 2014 -
  • Edward Guiliano, Ph.D.: Hey, Corporate Director!
    The campaign to stop cyber-crime begins with educating the next wave of professionals, but ongoing education and idea exchange are the ultimate keys to confronting cybercrime on the ground and in the boardroom. Read more: Cybersecurity,…
    - 4 days ago Monday, October 20, 2014 -
  • Jeff Fox: The Big Password Mistake That Hackers Are Hoping You'll Make
    Can you tell how strong a password is? Read more: Passwords, Hackers, Hacking, Hacker, Data Breaches, Icloud, Cybersecurity, Security, Technology News
    - 8 days ago Thursday, October 16, 2014 -
  • FBI Issues Alert Of Sophisticated Hacking Plot By China
    The FBI on Wednesday issued a private warning to industry that a group of highly skilled Chinese government hackers were in the midst of a long-runnin... Read more: Cyber Security, China Hackers, Hackers, Cybersecurity, Politics News…
    - 8 days ago Wednesday, October 15, 2014 -
  • Chuck Gomez: The Hacker Wars Hits NYC
    Are hackers always the bad guys? Not according to a fascinating new documentary, The Hacker Wars by Vivien Lesnik Weisman, a critically-acclaimed filmmaker. Read more: Hackers, Hactivists, Weev, Andrew Weev Auernheimer, Jeremy Hammond An…
    - 9 days ago Wednesday, October 15, 2014 -
  • Rebecca Abrahams: Hacking Back and the Cyber Balance of Power
    The Washington Post front page article on October 10 "Hacked Firms Quietly Talk about Fighting Fire with Fire" about growing corporate anger over successive cyber attacks has a new message: go on the offensive. Hack back! They are not alone.…
    - 9 days ago Tuesday, October 14, 2014 -
  • Andre Bourque: Does Apple's iCloud Have a Worm in It?
    The celebrity photo fiasco is only the most high-profile in a series of reasons that companies should consider more comprehensive and secure file storage and sharing options than iCloud. Read more: Iphone, Cybersecurity, Icloud, Apple Ip…
    - 9 days ago Tuesday, October 14, 2014 -
  • Change Your Dropbox Password Right Now
    Dropbox users, it may be time to update your passwords and enable two-factor authentication. A hacker claims to have stolen some 7 million usernames a... Read more: Dropbox, Dropbox Hack, Dropbox Password, Dropbox Passwords Compromised,…
    - 10 days ago Monday, October 13, 2014 -
  • Robert Siciliano: The King Of Credit Card Fraud
    Gonzalez became a paid informant for the agency's office in Miami. Gonzalez's work was so impressive that he spoke at seminars and conferences, delighting in shaking hands with the head of the Secret Service. But this sly devil of deception had trick…
    - 10 days ago Monday, October 13, 2014 -
  • JPMorgan CEO Asks For Help With Data Breaches
    JPMorgan Chase CEO Jamie Dimon offered a grave warning on Friday about future cyberattacks.Making his first public statement about the enormous da... Read more: JPMorgan Chase, Jamie Dimon JPMorgan Chase, Jamie Dimon, Jpmorgan Data Brea…
    - 12 days ago Saturday, October 11, 2014 -
  • Chase Bank Refuses To Admit How Many People Were Actually Hacked
    JPMorgan Chase is refusing to say how many individuals had their personal information stolen by hackers in the recent massive security breach. But tha... Read more: JP Morgan, JP Morgan Chase, JP Morgan Breach, Hackers, Phishing, JPMorga…
    - 17 days ago Monday, October 6, 2014 -
  • James Comey Compares Chinese Hackers To A 'Drunk Burglar'
    WASHINGTON (AP) — FBI Director James Comey compared Chinese hackers to a "drunk burglar" who steals with reckless abandon, even as they cost the U.S... Read more: Ap, James Comey Chinese Hackers, James Comey, Chinese Hackers, Hackers,…
    - 18 days ago Sunday, October 5, 2014 -
  • Larry Magid: Why Cybersecurity Is Patriotic and Humanistic
    I'd like to add National Cyber Security Awareness Month to the 4th of July, Memorial Day and Veterans Day as yet another patriotic holiday. That's because protecting your own devices and accounts is more than patriotic, it's downright humanistic.…
    - 18 days ago Sunday, October 5, 2014 -
  • Andrew Wang: 7 Things to Do Right Now Because Your Personal Data Is Under Attack
    It is the growth in our online shopping habits and preference to use plastic over cash that have increased our vulnerability to identity theft. Read more: Cybersecurity, Email, Identity Theft, Money, Money News, Passwords, Personal Finan…
    - 20 days ago Friday, October 3, 2014 -
  • If You Use Chase Bank, Watch Out For Email Scams Right Now
    After disclosing that an attack on its computer system compromised the accounts of more than half of all U.S. households, the nation's biggest bank is... Read more: JPMorgan Breach, Jpmorgan Hack, Hackers, Phishing Attacks, Business New…
    - 20 days ago Friday, October 3, 2014 -
  • Joe Ross: Payments 101: Consumer Tips for Safe Shopping
    Last year's Target breach has cost the company more than $148 million dollars. Just last month, Home Depot announced another major breach. There are a few simple things that consumers can do to get started and protect their purchases from these type…
    - 21 days ago Friday, October 3, 2014 -
  • JPMorgan Says Data Breach Hit 76 Million Households
    A cyber attack at America's biggest bank this summer affected more than half of all U.S. households -- far, far more than previously estimated, and th... Read more: Jpmorgan, JPMorgan Chase, Jpmorgan Hack, Jpmorgan Data Breach, Hackers,…
    - 21 days ago Thursday, October 2, 2014 -
  • CreditSesame.com: Infection Point: What Shellshock Tells Us About the State of Consumer Insecurity
    Nothing's secure. Believe in that mantra and you have at least a decent chance of avoiding becoming the next victim of a data breach, PoS attack, drive-by download or any one of the other many cyber threats that stalk us all daily. Read…
    - 21 days ago Thursday, October 2, 2014 -
  • The Most Dangerous Celebrity On The Web Is...
    LOS ANGELES (AP) — If you're about to Google Jimmy Kimmel, beware.Computer security company McAfee says the talk show host is the most dangerous c... Read more: Dangerous Celebrity, Dangerous Celebrities, Jimmy Kimmel, Mcafee, Ciara,…
    - 23 days ago Tuesday, September 30, 2014 -
  • Robert Siciliano: USB Drives Have Serious Security Flaws
    That little thing that you stick in your computer to store or transfer data can also mean very bad news. Read more: Recycling, Identity Theft, Technology, Hacking, Privacy, Identity Protection, Hackers, Technology News
    - 23 days ago Tuesday, September 30, 2014 -
  • Elizabeth Ann Thompson: 10 Things I Learned From Visiting the Facebook Campus
    I visited the Facebook campus, 1 Hacker Way, Menlo Park, California. and here are 10 things I learned:1. There is such a thing as a free lunch (bre... Read more: Facebook, Campus, Hacker Square, Hackers, Meno Park, Palo Alto, Technolo…
    - 23 days ago Tuesday, September 30, 2014 -
  • Guy Cimbalo: Sexism in Tech, and What One NYU Student Is Doing About It
    The Tumblr blog Hackers of NY launched in February this year and very quickly became a phenomenon, spawning spin off sites everywhere from Miami to Bangalore -- there's now a "Hackers of..." in nine countries and 13 cities. Read more: Te…
    - 23 days ago Tuesday, September 30, 2014 -
  • Luring The Elusive Cyber Security Pro
    Struggling to find scarce IT security talent? Make sure your hiring managers understand the certifications and match candidates for skills fit -- not just credentials.
    - Monday, April 14, 2014 -
  • Amazon Plans 3D Phone: Report
    Amazon phone capable of displaying images in three dimensions could ship this fall.
    - Saturday, April 12, 2014 -
  • Google Glass Goes Public
    Google Glass Explorer Program will be open to US-based adults on tax day.
    - Saturday, April 12, 2014 -
  • Facebook Changes: What To Expect
    Facebook cracks down on spammy posts, tweaks privacy options, and revamps messaging. Here's what it means to you.
    - Saturday, April 12, 2014 -
  • Hacker Weev Free After Appeal
    Andrew "Weev" Auernheimer, who embarrassed AT&T by exposing a security flaw, had his conviction overturned by federal appeals court.
    - Friday, April 11, 2014 -
  • Rogue IT Driven By Need For Speed
    We've lost control to business users before. But this time, the thing that initiated our pain (the cloud) may also be the cure.
    - Friday, April 11, 2014 -
  • 5 Ways Android Won Me Over
    From security to "Lego" programming, Android has more going for it than you might think.
    - Friday, April 11, 2014 -
  • 5 Job Interview Tips Via Alice In Wonderland
    Curiouser and curiouser! Use these techniques during your next interview to win that IT or security job offer.
    - Thursday, April 10, 2014 -
  • Google Glass For Parkinson's: 10 Findings
    Google Glass offers more health benefits than awkwardness, Parkinson's patients in UK study find.
    - Thursday, April 10, 2014 -
  • Hackathons Should Be More Than A Circus
    Tapping into developer talent at a hackathon should be fun, but don't lose sight of the potential business benefits.
    - Thursday, April 10, 2014 -
  • 5 reasons why hackers own your organization
    Last week I noted that most companies are either already hacked or could easily be hacked -- and, when they have anything worth stealing, are probably already owned by multiple APT (advanced persistent threat) groups.
    - 38 days ago Tuesday, September 16, 2014 -
  • How network virtualization is used as a security tool
    When people think of network virtualization, the advantages that come to mind typically include faster provisioning of networks, easier management of networks and more efficient use of resources. But network virtualization can have another major bene…
    - 38 days ago Monday, September 15, 2014 -
  • Sprint, Windstream traffic routing errors hijacked other ISPs
    Internet traffic routing errors made by U.S. operators Sprint and Windstream on the same day last week underscore a long-known Internet weakness, posing both security and reliability issues. Both of the errors involved Border Gateway Protocol (BGP),…
    - 39 days ago Monday, September 15, 2014 -
  • Data protection authorities find privacy lapses in majority of mobile apps
    Many mobile apps request too many permissions and don't explain how they collect users' personal information, a study of 1,211 popular apps by the Global Privacy Enforcement Network has found. The majority of the apps reviewed did not adequately expl…
    - 41 days ago Friday, September 12, 2014 -
  • Yahoo says it faced $250,000 daily fines for defying U.S. surveillance requests
    The U.S. government once threatened to fine Yahoo $250,000 a day if it failed to assist with its surveillance efforts, Yahoo said Thursday. Yahoo said it was threatened with the fines after it challenged surveillance powers granted to the U.S. govern…
    - 42 days ago Friday, September 12, 2014 -
  • How Google's tiff with certificate authorities can impact you
    Miffed certificate authorities are calling on Google to give websites more time to upgrade the security used in browser-to-server communications before displaying warnings in Chrome. The CAs are upset over Google's roughly six-month timetable for rat…
    - 42 days ago Thursday, September 11, 2014 -
  • Enemies no more, McAfee and Symantec agree to share threat data
    The recently launched Cyber Threat Alliance has been given a big boost with the news that Intel's McAfee division and former arch-enemy Symantec are to join the industry group whose mission is to create the first significant cross-vendor movement of…
    - 43 days ago Thursday, September 11, 2014 -
  • 3 security practices IoT will disrupt
    I made it back from DEFCON with both my phone and tablet intact, but I'm happy I didn't bring a light bulb. You see, if had brought a light bulb, and that light bulb was a smart LED bulb running Linux, it might be running someone else's software by n…
    - 43 days ago Thursday, September 11, 2014 -
  • Five million Gmail addresses and passwords dumped online
    An archive containing nearly 5 million Gmail addresses and plain text passwords was posted Tuesday on an online forum, but the data is old and likely sourced from multiple data breaches according to one security firm. A user with the online alias "tv…
    - 43 days ago Wednesday, September 10, 2014 -
  • Internet Explorer steals the Patch Tuesday spotlight again
    It's hard to imagine that we are already three-fourths of the way through 2014 -- at least as measured by Microsoft Patch Tuesdays. Today, Microsoft released four new security bulletins, but only one of them is Critical. Guess which one?
    - 43 days ago Wednesday, September 10, 2014 -
  • Cloud security: We're asking the wrong questions
    In the wake of the celebrity photo breach, the media is humming with stories disparaging the safety of the cloud.
    - 44 days ago Wednesday, September 10, 2014 -
  • Adobe fixes critical flaws in Flash Player, delays Reader and Acrobat updates
    Adobe Systems released a critical security update for Flash Player that fixes 12 security vulnerabilities, but pushed back its planned patches for Reader and Acrobat by a week. The Flash Player updates, available for Windows, Mac, and Linux, address…
    - 44 days ago Tuesday, September 9, 2014 -
  • Comcast's open Wi-Fi hotspots inject ads into your browser
    Comcast is giving users a very good reason to demand an HTTPS connection on every site they visit. The Internet service provider has started injecting ads for its services on websites where you wouldn't normally see them when you're using an Xfinity…
    - 44 days ago Tuesday, September 9, 2014 -
  • Salesforce.com warns customers of malware attack
    Salesforce.com users are being targeted by a new version of a computer Trojan that has typically attacked online banking customers until now. The malware threat is called Dyre or Dyreza and came to light in June. Like most online banking Trojans, it…
    - 44 days ago Tuesday, September 9, 2014 -
  • What you need to know about the Home Depot data breach
    On Monday, Home Depot issued a public confirmation to reports that they had experienced a data breach impacting debit and credit cards. They're the world's largest home improvement retailer, operating 2,266 stores in the U.S., as well as 10 Canadian…
    - 44 days ago Tuesday, September 9, 2014 -
  • Tech industry groups ask U.S. Senate to 'swiftly pass' NSA curbs
    Tech industry organizations have written a letter to leaders in the U.S. Senate, to ask them to swiftly pass the USA Freedom Act, legislation that is expected to end the collection of bulk domestic phone data by the National Security Agency.
    - 45 days ago Tuesday, September 9, 2014 -
  • Home Depot confirms breach of its payment systems
    Home Depot said Monday that its payment systems had been breached, potentially affecting any customers who shopped at its stores in the United States and Canada since April. There's no evidence yet that debit card PIN numbers had been compromised, th…
    - 45 days ago Monday, September 8, 2014 -
  • IBM secures SoftLayer with Intel trusted modules
    Fortifying its SoftLayer cloud services for enterprise use, IBM has started using Intel's chip-based Trusted Execution Technology to help organizations in highly regulated industries meet their auditing and security compliance requirements. On Monday…
    - 46 days ago Monday, September 8, 2014 -
  • Adobe slates critical Reader security update for Tuesday
    Adobe yesterday said it would issue security updates next week for its PDF viewer Reader as well as for Acrobat, its PDF creator, to fix critical flaws in the software on Windows and Apple's OS X. But it won't be updating Flash Player, its ultra-popu…
    - 48 days ago Friday, September 5, 2014 -
  • Apple CEO says iCloud security will be strengthened
    Apple, still reeling from the nude celebrity photo incident, plans to soon strengthen security around its iCloud storage service, according to CEO Tim Cook in a news report Thursday.
    - 49 days ago Friday, September 5, 2014 -
  • newUSB is now UEC (use with extreme caution)
    USB is an acronym for Universal Serial Bus; at least that is what it has stood for since 1999 when it was patented. But now it may take on a new meaning and instead stand for Ultimate Security Breakdown. To read this article in full or to leave a c…
    - 2 days ago Tuesday, October 21, 2014 -
  • newStaples confirms data breach investigation
    Monday evening, investigative journalist Brian Krebs reported that multiple banking sources were seeing a pattern of credit and debit card fraud. The common thread between each case were purchases made at Staples Inc. stores in the Northeastern U.S.T…
    - 3 days ago Monday, October 20, 2014 -
  • Obama signs Executive Order to bolster federal credit card security
    On Friday, at the headquarters of the Consumer Financial Protection Bureau, President Obama signed an Executive Order that will add chip-and-PIN protections (EMV) to federal credit cards starting in January. The President encouraged the financial an…
    - 4 days ago Monday, October 20, 2014 -
  • Dreaded SSLv3 bug no monster, only a POODLE
    On Tuesday, Google's Bodo Möller, along with fellow researchers Thai Duong and Krzysztof Kotowicz, disclosed the existence of a vulnerability in SSLv3, which allows the plaintext of secure connections to be calculated by an attacker on the network.W…
    - 9 days ago Tuesday, October 14, 2014 -
  • What you should consider when choosing a password manager
    Many security experts feel that passwords are no longer sufficient to keep online accounts safe from hackers, but we're still a long way from widespread adoption of biometrics and alternative methods of authentication.Most of us are stuck with using…
    - 10 days ago Monday, October 13, 2014 -
  • Hong Kong democracy activist websites compromised
    Four websites promoting democracy in Hong Kong have been rigged to deliver malicious software, according to a Washington, D.C.-based security company.The findings show that "dissenting groups, especially those seeking increased levels of freedom, f…
    - 10 days ago Monday, October 13, 2014 -
  • Kmart discloses malware related data breach
    On the same day that Dairy Queen announced their own malware-based data breach, Kmart (owned by Sears Holdings Corp.) reported the discovery that credit and debit cards were compromised after criminals installed malware on their payment systems.Acc…
    - 13 days ago Friday, October 10, 2014 -
  • Analysts react to Symantec split announcement
    On Thursday, Symantec said that it would separate into two business units; one that focuses entirely on security, while the other sticks to information management.Symantec's announcement follows similar ones from Hewlett-Packard, which said they woul…
    - 14 days ago Friday, October 10, 2014 -
  • Dairy Queen confirms Backoff malware led to data breach
    On Thursday, the Minneapolis-based Dairy Queen confirmed a data breach that impacts 395 stores. The fast food chain says that the source of the breach itself is the same family of POS malware that gained attention earlier this summer after an adviso…
    - 14 days ago Friday, October 10, 2014 -
  • Russian faces more charges in point-of-sale hacking case
    A Russian man accused of hacking point-of-sale systems in the U.S. is facing additional charges following a revised indictment returned by a grand jury on Thursday, the U.S. Department of Justice said.Roman Valeryevich Seleznev was arrested at an air…
    - 14 days ago Thursday, October 9, 2014 -
  • What to do in the aftermath of the JPMorgan breach
    The compromise of 10s of millions of JPMorgan Chase accounts poses the greatest risk of phishing attacks on consumers and small businesses, experts say.JPMorgan, the nation's largest bank, disclosed Thursday in a Securities and Exchange Commission fi…
    - 20 days ago Friday, October 3, 2014 -
  • JPMorgan says breach impacted 76M households and 7M small businesses
    On Thursday, JPMorgan Chase (JPMC) updated investors about their recently disclosed data breach in an 8-K filing with the Securities and Exchange Commission. The update comes hours after the financial giant disputed reports from the New York Times t…
    - 21 days ago Thursday, October 2, 2014 -
  • Shellshock attackers targeting NAS devices
    Researchers have discovered hackers trying to exploit the Shellshock Bash vulnerability to compromise network attached storage devices in universities in the U.S., Japan and Korea.The attackers were taking advantage of a publicly disclosed security w…
    - 22 days ago Wednesday, October 1, 2014 -
  • Threat Intelligence firm mistakes research for nation-state attack
    [Updates to this story appear on page two.]On Tuesday, Bloomberg published a story based on honeypot scans, which was a follow-up to a previously published piece that explored the nature of attacks against industrial-control systems.Bloomberg's stori…
    - 22 days ago Wednesday, October 1, 2014 -
  • 5 horror movies that scare security pros
    Image by DreamworksHere are five iconic movies whose plot lines might be adapted to strike fear into the heart of today's tech professionals. The horror movie genre has given us some great classics through the years, but for IT managers the real nig…
    - 23 days ago Wednesday, October 1, 2014 -
  • Malware program targets Hong Kong protesters using Apple devices
    A malware program that targets Hong Kong activists using Apple devices has trademarks of being developed by a nation-state, possibly China, according to a security company.Lacoon Mobile Security of San Francisco wrote on its blog on Tuesday that th…
    - 23 days ago Wednesday, October 1, 2014 -
  • Apple publishes patch for Shellshock vulnerability
    On Monday, Apple released three patches to address vulnerabilities in GNU Bash, commonly known as Shellshock, that if exploited could allow an attacker to execute commands on the targeted host.When Shellshock was disclosed, the primary concern was th…
    - 24 days ago Monday, September 29, 2014 -
  • Six key defenses against Shellshock attacks
    The number of attempts by hackers to compromise computers through the Shellshock vulnerability is rising, but companies have options for defending against attackers.Shellshock is the name given to a set of at least six vulnerabilities in GNU Bash, th…
    - 24 days ago Monday, September 29, 2014 -
  • IDG Contributor Network: Number 2 on my top 10 list for security executives: Reform
    Toon Pool I recently kicked off a new series of blogs based on the top 10 threats, trends and business priorities for security executives. On September 15, I published my first blog on the subject: History's Lessons.  This second blog will look i…
    - 24 days ago Monday, September 29, 2014 -
  • Two scenarios that would make OS X vulnerable to the Shellshock bug
    Apple's OS X is vulnerable to the Shellshock bug, but it's not that easy for attackers to take advantage of it, according to Intego, which specializes in security software for the operating system.Shellshock is the nickname for a flaw in the Bourne…
    - 25 days ago Sunday, September 28, 2014 -
  • newNOT OK GOOGLE: Android images can conceal code
    It's been fixed, but hordes won't have applied the upgrade Someone's found (yet) another nasty security flaw in Android, by crafting a way to pack malicious software to look like images.…
    - 2 days ago Tuesday, October 21, 2014 -
  • newIn dot we trust: If you keep to this 124-page security rulebook, you can own yourname.trust
    Step 1: Don't get owned. Step 2: Use HTTPS. Step 3: ... NCC Group has published a set of security standards that you'll have to follow if you want to operate a .trust website.…
    - 2 days ago Tuesday, October 21, 2014 -
  • newGoogle puts Chrome credentials on USB drives for two-factor authentication
    Company teams up with FIDO Alliance to support push-button security keys Google has announced support for a platform which will allow users to log into applications by pressing a button on a secured USB drive.…
    - 2 days ago Tuesday, October 21, 2014 -
  • newApple grapple: Congress kills FBI's Cupertino crypto kybosh plan
    Encryption would lead us all into a 'dark place', claim G-Men The FBI director James Comey's bid to have Congress kibosh default encryption appears to have publicly failed after senators said the proposal would be rejected.…
    - 2 days ago Tuesday, October 21, 2014 -
  • newChinese APT groups targeting Australian lawyers
    Have a bit of sympathy, people: lawyers hold YOUR data and juicy stuff about big deals Law firms are among Australian businesses being targeted by at least 13 Chinese advanced malware groups in a bid to steal intelligence from big business, says fore…
    - 2 days ago Tuesday, October 21, 2014 -
  • newEdward who? GCHQ boss dodges Snowden topic during last speech
    UK spies would rather 'walk' than do 'mass surveillance' Sir Iain Lobban's final speech as GCHQ director omitted any mention of that man Edward Snowden, and unlike recent speeches by FBI and law enforcement officials on both side of the Atlantic, the…
    - 2 days ago Tuesday, October 21, 2014 -
  • newHacked and ashamed? C'mon, Brits – report that cybercrime
    Gov.uk campaign: Consumer security led to '£670m losses' Internet-enabled frauds reached £670m across the UK in the 12 months running up to the end of August, according to new figures from the National Fraud Intelligence Bureau.…
    - 3 days ago Tuesday, October 21, 2014 -
  • newCarders punch holes through Staples
    Investigation launched into East Coast stores US office giant Staples is investigating a possible credit and debit card breach of its Northeastern stores.…
    - 3 days ago Tuesday, October 21, 2014 -
  • newPalo Alto Networks boxes spray firewall creds across the net
    Crummy configurations to blame, Moore hardening offered as remedy Misconfigured user identities for Palo Alto Networks firewalls are leaking onto the public web potentially exposing customer services including VPN and webmail, says security luminary…
    - 3 days ago Tuesday, October 21, 2014 -
  • newQuantum key security steps outside the box
    'Device independent' proof a step closer ... if you obey the laws of physics US researchers have come a step closer to turning quantum key distribution (QKD) into a “black box” that can be made provably secure regardless of whose boxes sit at eac…
    - 3 days ago Tuesday, October 21, 2014 -
  • newCisco battles POODLE with a listicle and some twaddle
    Borg lists products on which SSL 3.0 vuln has lifted leg, promises fixes Cisco has joined the growing list of vendors scrambling a response to the POODLE vulnerability, with a number of systems confirmed vulnerable and more under investigation.…
    - 3 days ago Monday, October 20, 2014 -
  • China is ALREADY spying on Apple iCloud users, claims watchdog
    Attack harvests users' info at iPhone 6 launch Last week Apple CEO Tim Cook was very happy that the iPhone 6 is at last going on sale in China. But it seems the Chinese government has its own plans for owners of the new device.…
    - 3 days ago Monday, October 20, 2014 -
  • FYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're looking for
    It's on by default – didn't you read the small print? There has been growing disquiet over Apple's desktop search app Spotlight, which sends queries for things back to the company's servers to process.…
    - 3 days ago Monday, October 20, 2014 -
  • Sophos to offshore American support operations
    Blame Canada? Exclusive  Sophos plans to offshore support operations from the US to Canada and the Philippines as part of a wide-ranging restructuring of its support operations.…
    - 4 days ago Monday, October 20, 2014 -
  • Twitter 'news' spreads faster than Ebola #FakeCures #Malware
    Security watchers warn to brace for scams Social media has become a conduit for the spread of fake cures and treatments for Ebola. As if that weren't bad enough, confusion about the epidemic is also being harnessed to push malware and other cybercrim…
    - 4 days ago Monday, October 20, 2014 -
  • Visual voicemail hack makes your messages a snack
    Rate limiter patch is a fun MEELLION-user DoS banhammer Ruxcon  Sydney penetration tester Shubham 'Shubs' Shah has urged US and European researchers to probe their telco's voicemail security after he found accounts held by local telcos Vodafone and…
    - 4 days ago Monday, October 20, 2014 -
  • Microsoft pulls <i>another</i> dodgy patch
    Redmond makes a hash of hashing add-on Another Patch Update Tuesday, another red face for Microsoft, which has again been forced to pull a patch to prevent nasty side-effects.…
    - 4 days ago Monday, October 20, 2014 -
  • 'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
    15 months home detention leaves egg on feds' faces as they grab for more power The man that Australia's Federal Police once described as "a self-proclaimed leader of the group ‘Lulz Security’ (Lulzsec)" has been sentenced to 15 months of home det…
    - 4 days ago Monday, October 20, 2014 -
  • Oz privacy comish says breaches could double this year
    Åustralian outfits have already 'fessed up to sixty breaches since March 2014 The office of Australia's Federal Privacy Commissioner has received 60 voluntary data breach notifications in the six months since 12 March compared to 71 received in the…
    - 4 days ago Monday, October 20, 2014 -
  • FIRST standards to clean up messy CERTs

    - 4 days ago Sunday, October 19, 2014 -
  • Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
    Zuck's ad empire DOESN'T see details in plain text. Phew! Facebook's security bods routinely trawl public "paste" sites for email addresses and passwords stolen from its users, as part of an effort to outfox wrongdoers trying to hack into personal da…
    - 5 days ago Saturday, October 18, 2014 -
  • Apple releases MEGA security patch round for OS X, Server and iTunes
    Brings POODLE to heel While the world+dog was distracted by all the shiny new iThings Tim Cook was showing off on Thursday, Apple quietly puMPED out patches for 150 CVE-issued bugs in its server and desktop operating systems and the iTunes media play…
    - 6 days ago Friday, October 17, 2014 -
  • US government fines Intel's Wind River over crypto exports
    New emphasis on encryption as a weapon? The US Government has imposed a $750,000 fine on an Intel subsidiary for exporting encryption to China, Russia, Israel and other countries…
    - 6 days ago Friday, October 17, 2014 -
  • UK's a very popular target for EMEA cyberspies – report
    Germany and Saudi Arabia fill out FireEye cyberpwn podium Malware attacks, especially in Europe, nearly doubled in the first half of 2014, according to a new report.…
    - 7 days ago Friday, October 17, 2014 -
  • Facebook doubles ad-hacking bounty
    Small security snafus snuffed, try the tiny and technical Facebook has doubled the cash it will pay out to folks who report holes in its advertising code.…
    - 7 days ago Friday, October 17, 2014 -
  • Australian spookhaus busted for warrantless tap of own phones
    Stop laughing: it also messed up civilian telecoms intercepts and is about to get more powers Australia's Inspector-General of Intelligence and Security (AIGIS) has found that the nation's Australian Security and Intelligence Agency (ASIO) spied on i…
    - 7 days ago Thursday, October 16, 2014 -
  • Careless Whisper? Anonymous messaging app accused of stalking users, blabbing to Feds
    Startup denies outing peeps posting witty gags The makers of Whisper have denied claims that the anonymous messaging app is secretly tracking the whereabouts of its privacy-conscious users.…
    - 7 days ago Thursday, October 16, 2014 -
  • FBI boss: We don't want a backdoor, we want the front door to phones
    Claims it's what the Founding Fathers would have wanted – catching killers and pedos FBI director James Comey is continuing his charm offensive against phone encryption – by urging tech giants to do more to help the agency monitor people.…
    - 7 days ago Thursday, October 16, 2014 -
  • Bad news, fandroids: He who controls the IPC tool, controls the DROID
    Researchers discover Binder blinder A security flaw in a core message-passing mechanism leaves every Android device potentially vulnerable to attack, security researchers warned on Thursday.…
    - 7 days ago Thursday, October 16, 2014 -
  • Hacker-hunters finger 'Keyser Soze' of Russian underground card sales
    Report claims user named 'Rescator' is mastermind A hacker based in Odessa, Ukraine has become the main provider of data stolen from compromised credit cards, a new study claims.…
    - 7 days ago Thursday, October 16, 2014 -
  • Drupal SQL injection nasty leaves sites 'wide open' to attack
    Usual drill - install the patch tout de suite A newly patched SQL injection flaw in Drupal leaves sites that rely on the widely used web development platform wide open to attack.…
    - 8 days ago Thursday, October 16, 2014 -
  • Securobods RAGE over $600k Kickstarter Tor box components
    Devs insist: It's NOT just an off-the-shelf circuit board Updated  The developer behind Tor privacy router Anonabox has defended the product — which has so far attracted $600,000 in crowd funding — following allegations it was little more than a…
    - 8 days ago Thursday, October 16, 2014 -
  • FinFisher spyware used to snoop on Bahraini activists, police told
    Gamma International on the end of UK criminal complaint Allegations that three Bahraini activists resident in Britain were spied on by Bahraini authorities using British spyware have led to a criminal complaint.…
    - 8 days ago Thursday, October 16, 2014 -
  • Man bites dog: HTTPS-menacing POODLE is 'hard to exploit' – unless you're on public Wi-Fi
    Avoid sketchy pub wireless, warn infosec bods Analysis  Mozilla will ditch support for the insecure SSL 3.0 from Firefox next month, following the discovery of a design flaw in the protocol that allows hackers to hijack victims' online accounts.…
    - 8 days ago Thursday, October 16, 2014 -
  • Adobe CSO offers Oracle security lesson: Go click-to-play
    Pots and kettles in heated argument at Oz security confab Oracle could have saved mountains of cash and bad press if Click-to-Play was enabled before Java was hosed by an armada of zero day vulnerabilities, Adobe security boss Brad Arkin says.…
    - 8 days ago Thursday, October 16, 2014 -
  • Vulnerable utilities, telcos, top of new Aussie natsec centre's to-do list
    Headcount to tip 150 tomorrow, double by year's end The Australian Cyber Security Centre (ACSC) will increase its headcount from 90 to 150 as soon as possible, then grow to full capacity of 300 seats by year's end.…
    - 8 days ago Wednesday, October 15, 2014 -
  • Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
    Four new patches for open-source crypto libraries Poodle  If you're using the popular OpenSSL open source cryptography library, you have more to worry about than the recently disclosed POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerab…
    - 8 days ago Wednesday, October 15, 2014 -
  • Twitter, Cloudflare kill SSL 3.0 ... and here's how YOU CAN TOO
    Flawed HTTPS protocol axed amid attack fears Poodle  Websites and web browser makers are moving quickly to ditch the outdated SSL 3.0 encryption protocol for HTTPS following the discovering of a worrying design flaw.…
    - 8 days ago Wednesday, October 15, 2014 -
  • FireEye, Microsoft, Cisco team up to take down RAT-flinging crew
    Tired of living in the, er, Shadow of Moudoor Security vendors have teamed up to fight a prolific cyber-espionage group thought to be based in China.…
    - 8 days ago Wednesday, October 15, 2014 -
  • Roll your own Bitcoin client? Prepare to be raided
    Attackers exploit borked random numbers The engineer behind the Heartbleed checker has created a tool to hunt down wallets from poorly secured transactions that leak private keys.…
    - 8 days ago Wednesday, October 15, 2014 -
  • Parental Controls For YouTube
    Kids seem to be glued to YouTube these days. As a parent, it can be daunting to try and police the content that they watch. What's a parent to do?In our featured article: YouTube Parental Controls...Read Full Post
    - Saturday, May 31, 2014 -
  • Craigslist Safety and Security Tips
    Craigslist can be both a fun and scary place. You never know what you'll find for sale, and you often don't know who is on the other end of that sale until you complete the deal....Read Full Post
    - Saturday, May 31, 2014 -
  • 5 Tips to Help You Land an IT Security Job
    IT security jobs are still in high demand, especially given the fact that cyber crime seems to be a constant fixture in the news with data breaches becoming an almost daily occurrence....Read Full Post
    - Saturday, May 31, 2014 -
  • How to Avoid Becoming a Victim of the iPhone Lock Ransom Scam
    There is a new scam sweeping through Australia and other parts of the world this week. Victims are having their iPhones locked remotely by hackers who apparently compromised their iCloud account credentials. The victims are then being issued ransom d…
    - Saturday, May 31, 2014 -
  • Are Your Employees Leaking Sensitive Company Information on Facebook?
    Like it or not, Facebook is here to stay. Some companies allow employees to use Facebook at work and some strictly prohibit it. If your company allows it then you might want to continue reading....Read Full Post
    - Thursday, May 29, 2014 -
  • Rev up Your Security with a 10-minute PC Security Tune-up
    Securing your PC doesn't have to take hours and hours of your time. There are a lot of things you can do in just a few minutes to help improve your security posture....Read Full Post
    - Thursday, May 29, 2014 -
  • How to Prevent Your Web Browser From Being Hijacked
    Did you just try to Google something but instead of going to Google, your browser took you to some strange search engine you've never heard of?You might have just become a victim of browser hijacking. In this week's featured article: How to Prevent…
    - Wednesday, May 28, 2014 -
  • Are Your Clicks Getting Jacked?
    Have you ever been clickjacked? While it may sound like some kind of pro wrestling move, I assure you it is not.Clickjacking is a security threat that users all over the world are experiencing. How can you stay safe from clickjacking? Check out our…
    - Wednesday, April 30, 2014 -
  • Is Your Google+ Account Secure?
    Google+ seems to be slowly gaining some traction. It's probably not quite the big Facebook contender that Google had hoped it would be, but it is gaining steamJust like Facebook, Google+ has privacy and security settings that you should configure t…
    - Wednesday, April 30, 2014 -
  • If Your PC Was Just Hacked, Read This:
    You've just discovered that your PC has been hacked. You could run away and go hide in a corner, or you can take action and do something about it.If you opt for taking action, then you need to check out our article: I've Been Hacked! Now What? We'l…
    - Wednesday, April 30, 2014 -
  • newExperts: Beware of hackers, security lapses
    GOSHEN Something as simple as logging onto a free wireless service can expose all of your private information to hackers.
    - 13 hours ago Thursday, October 23, 2014 -
  • newVietnam police hunt hackers behind mass outage
    Vietnamese cybersecurity authorities are hunting hackers believed to be responsible for the country's biggest-ever online attack last week, according to the founder of a security website in Hanoi. "This is the biggest cyber-attack ever in Vietnam, af…
    - 17 hours ago Thursday, October 23, 2014 -
  • newApple says hackers attacked iCloud
    Apple has posted a new security warning for users of its iCloud online storage service amid reports of a concerted effort to steal passwords and other data from people who use the popular service in China . "We're aware of intermittent organized netw…
    - 21 hours ago Wednesday, October 22, 2014 -
  • newWindows 10 to get two-factor authentication built-in
    Microsoft is continuing its crusade to get CIOs interested in Windows 10, touting new security features that include two-factor authentication built directly into the OS. The effort to bake two-factor authentication into Windows 10 is intended at doi…
    - 21 hours ago Wednesday, October 22, 2014 -
  • newMicrosoft misses Windows bug, hackers slip past patch
    Microsoft patched one bug in Windows last week, but missed another that hackers continue to exploit, according to security researchers at McAfee. On Tuesday, Microsoft confirmed that cyber criminals are targeting victims using tricked-out PowerPoint…
    - 21 hours ago Wednesday, October 22, 2014 -
  • newEMC says it generated $6.03 billion in revenue in Q3, makes changes at VCE venture
    Hopkinton-based data storage giant EMC on Wednesday said it generated $6.03 billion in revenue for the third quarter this year, up 9 percent over the same period last year, though it missed Wall Street projections for earnings per share.
    - 1 day ago Wednesday, October 22, 2014 -
  • newMobile cyber-attacks surge as hackers chase banking info
    Android users faced six times as many cyber-attacks this year than last, according to a new study. Hackers targeted 588,000 mobile users worldwide between August 2013 and July 2014.
    - 1 day ago Wednesday, October 22, 2014 -
  • newStartup Aims To Remake Computer Security For the Cloud Age
    He was VMware's chief technology officer at the time, one of the driving forces behind this massive deal, and after leaving VMware for venture capital outfit General Catalyst Partners , he thinks he's found a startup that will do even more to change…
    - 1 day ago Wednesday, October 22, 2014 -
  • newSeattleland: - Kidnapped' Russian Hacker Facing New Charges
    Traveling with his partner and her daughter, the muscular, lightly bearded Russian computer whiz was winding up a vacation trip to the island nation that bills itself as "the sunny side of life," and was hoping to catch a noon jet to Moscow. Instead,…
    - 2 days ago Wednesday, October 22, 2014 -
  • newU.S. government probes medical devices for possibl...
    The U.S. Department of Homeland Security is investigating about two dozen cases of suspected cybersecurity flaws in medical devices and hospital equipment that officials fear could be exploited by hackers, a senior official at the agency told Reuters…
    - 2 days ago Wednesday, October 22, 2014 -
  • newNew York financial regulator pushes banks to plug ...
    Following the massive cyber attack on the biggest U.S. bank JPMorgan Chase & Co disclosed in August, and other financial institutions, government authorities in United States are pushing financial institutions and brokerage houses to close glaring ga…
    - 2 days ago Wednesday, October 22, 2014 -
  • newMore than 500M financial records stolen by hackers
    Office supply chain Staples disclosed Tuesday that its customers' personal data may be compromised. Staples is the latest in a growing list of hacked companies.
    - 2 days ago Tuesday, October 21, 2014 -
  • newWhite Hat Hackers Fight For Legal Reform
    Security researchers petition to update digital intellectual property and copyright protection laws that limit their work in finding and revealing security bugs. Billy Rios has discovered major security holes in TSA passenger-screening equipment at U…
    - 2 days ago Tuesday, October 21, 2014 -
  • newApple's China ICloud Attacked by State Hackers, Greatfire Says
    Apple Inc.'s iCloud service in China was attacked by government-backed hackers, according to Greatfire.org, which monitors Internet censorship in the country. A man-in-the-middle attack, where hackers position themselves between users and computer se…
    - 2 days ago Tuesday, October 21, 2014 -
  • newCyber Attack Downs Mozambique's @Verdade News Site on Election Day
    See all those languages up there? We translate Global Voices stories to make the world's citizen media available to everyone. @Verdade , a Mozambican weekly newspaper and Global Voices partner, was the victim of a massive cyber attack on Oct. 15, 201…
    - 2 days ago Tuesday, October 21, 2014 -
  • newData protection damages have to be proven
    Data protection breaches do not entitle per se to claim damages that damages have to be proven by the plaintiff according to the Italian Supreme Court. The Italian Supreme Court, the Corte di Cassazione, held that an unlawful treatment of personal da…
    - 3 days ago Tuesday, October 21, 2014 -
  • newU.S. national security prosecutors shift focus from spies to cyber
    The U.S. Justice Department is restructuring its national security prosecution team to deal with cyber attacks and the threat of sensitive technology ending up in the wrong hands, as American business and government agencies face more intrusions. The…
    - 3 days ago Tuesday, October 21, 2014 -
  • newApple Releases Security Updates for QuickTime
    Original release date: October 23, 2014Apple has released QuickTime 7.7.6 for Windows 7, Vista, XP SP2 or later to address multiple vulnerabilities, some of which may allow remote attackers to execute arbitrary code or cause a denial of service.Users…
    - 3 hours ago Thursday, October 23, 2014 -
  • newMicrosoft Releases Advisory for Unpatched Windows Vulnerability
    Original release date: October 22, 2014Microsoft has released a security advisory to provide recommended mitigations for an unpatched vulnerability, (CVE-2014-6352) which affects all Microsoft Windows releases except Windows Server 2003. This vulnera…
    - 1 day ago Wednesday, October 22, 2014 -
  • Apple Releases Security Updates for iOS and Apple TV
    Original release date: October 20, 2014Apple has released security updates for iOS devices and Apple TV to address multiple vulnerabilities, one of which could allow an attacker to decrypt data protected by SSL.Updates available include:iOS 8.1 for i…
    - 3 days ago Monday, October 20, 2014 -
  • OpenSSL 3.0 Protocol Vulnerability
    Original release date: October 17, 2014US-CERT is aware of a design vulnerability found in the way SSL 3.0 handles block cipher mode padding. Exploitation of this vulnerability may allow a remote attacker to decrypt and extract information from insid…
    - 6 days ago Friday, October 17, 2014 -
  • Apple Releases Security Update 2014-005
    Original release date: October 17, 2014Apple has released Security Update 2014-005 to address vulnerabilities in SSL 3.0.US-CERT recommends users and administrators review Apple Security Update HT6531 for additional details.This product is provi…
    - 6 days ago Friday, October 17, 2014 -
  • Drupal Releases Security Advisory
    Original release date: October 17, 2014Drupal has released a security advisory to address an application program interface (API) vulnerability (CVE-2014-3704) that could allow an attacker to execute arbitrary SQL commands on an affected system.This v…
    - 6 days ago Friday, October 17, 2014 -
  • Google Releases Security Updates for Chrome and Chrome OS
    Original release date: October 16, 2014Google has released security updates to address multiple vulnerabilities in Chrome and Chrome OS, one of which could potentially allow an attacker to take control of the affected system.Updates available include…
    - 7 days ago Thursday, October 16, 2014 -
  • Ebola Phishing Scams and Malware Campaigns
    Original release date: October 16, 2014US-CERT reminds users to protect against email scams and cyber campaigns using the Ebola virus disease (EVD) as a theme. Phishing emails may contain links that direct users to websites which collect personal inf…
    - 7 days ago Thursday, October 16, 2014 -
  • OpenSSL Patches Four Vulnerabilities
    Original release date: October 16, 2014OpenSSL has released updates patching four vulnerabilities, some of which may allow an attacker to cause a Denial of Service (DoS) condition or execute man-in-the-middle attacks. The following updates are availa…
    - 7 days ago Thursday, October 16, 2014 -
  • Mozilla Releases Security Updates for Firefox and Thunderbird
    Original release date: October 15, 2014The Mozilla Foundation has released security updates to address multiple vulnerabilities in Firefox and Thunderbird. Exploitation of these vulnerabilities may allow an attacker to obtain sensitive information, b…
    - 9 days ago Wednesday, October 15, 2014 -
  • Дураки на экранах

    - Saturday, December 13, 2008 -
  • Казаки-разбойники

    - Wednesday, December 10, 2008 -
  • 22
    Привет.Сегодня 22.Сегодня госстат установил инфляцию на уровне почти 22%.Через 22 дня Новый Год!Конечно настроение не праздничное: кризис, р…
    - Monday, December 8, 2008 -
  • Маразм крепчал
    Привет.Государственный комитет статистики сообщил, что в октябре доходы населения сократились на 1% по сравнению с сентябрем до 77 627 млн.…
    - Friday, December 5, 2008 -
  • Защити себя сам
    Привет.Сокращения на многих промышленных предприятиях и массовое обналичивание всех вкладов привело к росту краж и грабежей.Наша добле…
    - Thursday, December 4, 2008 -
  • Спасите отечественного автопроизводителя
    Привет.Продолжаем наблюдать за кризисом. Очень интересно сравнивать действия в разных государствах.В нашей стране хотят ввести дополни…
    - Thursday, December 4, 2008 -
  • Шоу маст гоу вон
    Привет.Шоу под названием "антикризис в Украине" продолжается.Комментарии.net пишут, что министр финансов предлагает навязать всем банкам…
    - Wednesday, December 3, 2008 -
  • Вот такой у нас футбол
    Привет.Не запланированная заметка.Случайно зашел на Корреспондент.net:Вот такой у нас футбол: УЕЫИ на это все уже было 53 комментария.Посто…
    - Wednesday, December 3, 2008 -
  • Доллар гудбай...
    Привет.Наша страна (Украина) - оплот свободы и демократии.Сейчас многие говорят о конце доллара США - переход стран Северной Америки на ед…
    - Wednesday, December 3, 2008 -
  • Итоги ноября
    Привет.Давно я не проводил анализа входящего трафика. Сегодня подводим итоги ноября 2008 года. Общее число посещений 1038, посещено страниц -…
    - Tuesday, December 2, 2008 -
  • Пришла зима - пропала "зелень"
    Привет.В нашем "замечательном" государстве в течение последних нескольких лет национальная валюта была "жестко" привязана к национально…
    - Monday, December 1, 2008 -
  • А кто считает расходы на эксплуатацию?

    - Friday, November 28, 2008 -
  • Мой дом - моя крепость
    Привет.В нашем регионе кризис продолжает бушевать. Количество безработных (реальных) растет. Людей могут и не сокращать, но отправляют в…
    - Friday, November 28, 2008 -
  • И эти люди запрещают мне в носу ковыряться

    - Tuesday, November 25, 2008 -
  • Кризис не хотят замечать
    Привет.Кризис бушует. Предприятия сокращают свой штат. Многих отправляют в "бесплатные" отпуска. Многим задерживают зарплаты. Многим офи…
    - Monday, November 24, 2008 -