website statistics

British Spyware On Smartphones And PCs Under Repressive Regimes

British Spyware On Smartphones And PCs Under Repressive Regimes

Commercial spyware is a lucrative market because repressive regimes around the world tend to deploy spyware to monitor dissidents. Two security researchers have now found out that a spyware, FinSpy, is being used to spy on activists in Bahrain and numerous other countries.

By On September 3, 2012 Respond
Add To Bookmark Add To Readlist  
Last.fm May Have Been Targeted In Yet Another Password Leak

Last.fm May Have Been Targeted In Yet Another Password Leak

The social media is still reeling from the after-effects of the hacking and leaking of some 6.5 million LinkedIn passwords, an incident that has really left users shaky regarding the security of social networks. And while the news is still fresh, here is yet another similar bit of news. This time, the well-known internet radio Last.fm has been targeted.

By On June 8, 2012 Respond
Add To Bookmark Add To Readlist  
Undergrad Student At University Of Nebraska Was Involved In Data Breach

Undergrad Student At University Of Nebraska Was Involved In Data Breach

During this week, it had been reported that a major data breach had occurred at University of Nebraska. The security breach had directly affected the information system which kept confidential information of students, alumni and applicants, in total storing the personal data of some 650,000 people.

By On June 2, 2012 Respond
Add To Bookmark Add To Readlist  
Homeland Security Monitors User Data Online Using Specific Words Online

Homeland Security Monitors User Data Online Using Specific Words Online

Have you ever wondered how government is able to sift through the whole bulk of user data online to discern any security-related risks or any emergencies? Well, it turns out Department of Homeland Security was able to come up with a very convenient solution. It brought together a list of so-called suspicious words. These words were then tracked to flag content which could be suspicious.

By On May 28, 2012 Respond
Add To Bookmark Add To Readlist  
Religious Sites Infect Your Computer More Often Than Porn Sites

Religious Sites Infect Your Computer More Often Than Porn Sites

Many readers may feel surprised at the title of this article but that is what a latest study reveals. According to the study, you are far more likely to be a victim of a malware when visiting a religious website as compared to when visiting a porn site.

By On May 5, 2012 Respond
Add To Bookmark Add To Readlist  
Russia And US Initiate ‘Red Phone’ Hotline To Discuss Cyber Attacks

Russia And US Initiate ‘Red Phone’ Hotline To Discuss Cyber Attacks

The world has come a long way from being threatened merely by nukes and missiles to now being also threatened by mass-launched cyber attacks. And that is precisely why, the two leading super powers of the world, US and Russia, are now trying to create a direct line of communication between the two nations so as to discuss any possible cyber attacks in the future.

By On April 30, 2012 Respond
Add To Bookmark Add To Readlist  
Google Ex-CEO Eric Schmidt Thinks Online Anonymity Is Dangerous Business

Google Ex-CEO Eric Schmidt Thinks Online Anonymity Is Dangerous Business

Online anonymity has been a bitter pill for governmental organizations as well as the standard market forces since it can’t be monetized and can’t be easily traced. Now, Google’s CEO Eric Schmidt thinks that online anonymity is a dangerous thing and that in the coming days, governments would want to put an end to that to ensure security. Clearly, Schmidt does seem to be towing the government’s line.

By On April 6, 2012 Respond
Add To Bookmark Add To Readlist  
In Wake Of Cyber Attacks, Pentagon Plans New Rules Of Engagement

In Wake Of Cyber Attacks, Pentagon Plans New Rules Of Engagement

A number of US companies as well as government-related organizations have been targeted through cyber attacks and sensitive data has been either stolen or leaked to the web. So far, the role of Pentagon has been fairly limited when it came to cyber warfare. But now, this may change as Pentagon contemplates new rules of engagement about the cyber game.

By On March 29, 2012 1 Response
Add To Bookmark Add To Readlist  
Human Traffic Accounts For Only 49% Of Internet’s Total Traffic

Human Traffic Accounts For Only 49% Of Internet’s Total Traffic

The traffic on internet has increased literally exponentially over the recent few years. Millions of users have flocked to this online realm which has come about to change the very way we live and behave. However, it would be surprising to note that despite so many millions of users, more than half of internet’s traffic comes from non-human sources.

By On March 17, 2012 Respond
Add To Bookmark Add To Readlist  
Google Asked To Grant “The Right To Be Forgotten” To Its Users

Google Asked To Grant “The Right To Be Forgotten” To Its Users

Recently, the Audiencia Nacional urged European Court of Justice to rule on Spanish citizens’ privacy rights when it comes to search engines. More precisely, the Spain’s highest court requests that Google users have the personal data deleted from the search engines. The European Court of Justice will have the mission to decide if the Spanish Court request is lawful or not.

By On March 7, 2012 Respond
Add To Bookmark Add To Readlist  
[Tutorial] How To Launch Internet Explorer 8 With Private Browsing Mode

[Tutorial] How To Launch Internet Explorer 8 With Private Browsing Mode

Since version 8, Internet Explorer offers a private browsing mode that cannot keep track of surfing, the web sites you visited or cookies. This tutorial will show you how to create a shortcut on the Windows desktop to run Internet Explorer with the private browsing mode instead of having to activate it each time using the key combination [CTRL + SHIFT + P].

By On March 2, 2012 Respond
Add To Bookmark Add To Readlist  
CryptDB – Secure Data Encryption For SQL Databases

CryptDB – Secure Data Encryption For SQL Databases

Data transfer online is a tricky business. Especially for online applications which make use of large amounts of data, there are a number of ways the security of this data can be compromised. It can be due to a data theft by a third-party or by a rogue system administrator himself. To prevent these, CryptDB is a very effective tool which helps secure the data.

By On December 21, 2011 Respond
Add To Bookmark Add To Readlist  
Microsoft Claims WebGL Graphics Technology Used In Chrome And Firefox To Be Harmful

Microsoft Claims WebGL Graphics Technology Used In Chrome And Firefox To Be Harmful

Microsoft Security Response Center (MSRC) Engineering has concluded that WebGL, the royalty free cross-platform API for browser-based 3D graphics is overly permissive, insecure and potentially harmful to machines using it, development of the technology was spearheaded by Mozilla, Google, Opera, AMD, and Nvidia. WebGL is the 3D rendering standard used in both Chrome and Firefox and can be turned on in Apple’s Safari browser, it turns out the technology has a flaw, allowing hackers low level access to graphics cards and possible entry to grab at user’s data. The Cupertino crew plans to bring WebGL to iOS 5 with one very strange restriction and it will only be available to iAd developers. It will eventually be opened up in mobile Safari for everyone, but for the moment it seems browser-based 3D graphics will be limited to advertisements on the iPhone…………

By On June 19, 2011 Respond
Add To Bookmark Add To Readlist  
LulzSec Leaked 150,000+ User Credentials, Check If Your Password Is Out There

LulzSec Leaked 150,000+ User Credentials, Check If Your Password Is Out There

LulzSec has a bizarrely funny website and an addictive Twitter feed, and is even going after 4chan and the members of Anonymous, you can categorize them as bad guys, but they’re also doing everyone a big favor, revealing the pathetic state of computer security. The current hacking epidemic, of which LulzSec is a big part is happening because there are serious holes in the digital defenses of high-profile targets and it’s site has a page full of data it has released from its various hacks. LulzSec is begging to get busted, but also in a perverse way giving back to a community that enjoys seeing the flaws of big companies exposed and the ironic twist is that these big companies are made big by the average public whose private information is being revealed in the hacks………….

By On June 18, 2011 3 Responses
Add To Bookmark Add To Readlist  
Internet Giants Having Issues With The French Law

Internet Giants Having Issues With The French Law

French Government is going to court for its newest law regarding internet based service provider companies. The lawsuit is filed by companies like Google and Facebook over a recent law that has been approved by the government. The rule is simple; these companies would have to hand out personal information of users for a year if the French authorities ask.

By On April 12, 2011 Respond
Add To Bookmark Add To Readlist  
Topic List
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook