An international group of independent security researchers announced Tuesday that they have found a significant weakness in the Internet digital certificate infrastructure used by many Internet businesses. The flaw could conceivably allow cybercriminals to create fake certificates that would then be...
The history of James Bond films is the history of our fascination with technology: booby-trapped briefcases, jetpacks, cars with machine guns and ejector seats, super-magnet watches, cars driven by remote control, acid-filled fountain pens, cars that become invisible, sharks with frickin' lasers...
The scenarios jump right out of a Brad Thor or Vince Flynn technothriller novel: Terrorists, using the microblogging service Twitter in conjunction with Google Maps, cell phone video and global positioning system technology, stage an ambush on troops in Iraq or coordinate an attack in an American ci...
Microsoft has angered Chinese computer users with its latest antipiracy move. On Tuesday, during its Global Anti-Piracy Day, Microsoft turned Windows Genuine Advantage loose on the Chinese people. Other users worldwide are familiar with WGA, which famously labeled legitimate users as pirates and dis...
The Hacker Underground is dead. Long live the Hacker Underground! In the most recent issue of Phrack Magazine, I read an article titled "The Underground Myth," that makes a number of astute points about the demise of the hacking scene of the last few decades. The author describes a technical landsca...
Two weeks ago, Republican vice presidential nominee Sarah Palin discovered that a hacker had gained access to her personal e-mail account and posted some of its contents -- both letters and photos -- on a Web site viewable by the public. The incident underscores the importance for anyone with secure...
October is the expected release date for the next version of the PCI Data Security Standard, 1.2. Since the PCI Standard's creation -- to serve as a guideline to help organizations that process card payments, prevent credit card fraud, hacking and various other security vulnerabilities and threats -...
Software is an integral part of everything we do now -- drive a car, make a phone call, turn on the TV, get on an airplane and, yes, exercise your franchise. Is this the same software that just crashed my new cell phone or sent my credit card number off to a hacker in Eastern Europe? Well, not exact...
Alaska Governor and vice presidential candidate Sarah Palin received a harsh lesson in the relative security, or rather lack thereof, of commercial e-mail accounts Wednesday. The GOP hopeful for VP discovered her personal Yahoo e-mail account, on which she allegedly conducted official state business...
IBM is increasing its arsenal against hackers with a new beefed-up blade server. The IBM BladeCenter PN41, announced this week, combines Deep Packet Inspection technology from CloudShield with IBM's other protection platforms to create a powerhouse against attacks. The system is designed specificall...
Ban
Regulate
Maintain status quo
Undecided
Enter your Username and Password to sign in.