An international group of independent security researchers announced Tuesday that they have found a significant weakness in the Internet digital certificate infrastructure used by many Internet businesses. The flaw could conceivably allow cybercriminals to create fake certificates that would then be...
Well, the holiday season is upon us once again, and that means it's the beginning of what, for many geeks, is a time of unnatural, enforced, repeated and prolonged socialization. Yes, it can be an uncomfortable time for those of us who aren't perky, extroverted cheerleader-types, and we here at Linu...
The history of James Bond films is the history of our fascination with technology: booby-trapped briefcases, jetpacks, cars with machine guns and ejector seats, super-magnet watches, cars driven by remote control, acid-filled fountain pens, cars that become invisible, sharks with frickin' lasers...
Mirror, mirror, on the wall, who are the greatest geeks of us all? That question -- posed in an Australian iTnews article, "The Top 10 Greatest Geeks of All Time" on Monday -- sparked quite a discussion in the blogosphere last week, garnering more than 1,300 Diggs and 280 comments by Friday. Who was...
The scenarios jump right out of a Brad Thor or Vince Flynn technothriller novel: Terrorists, using the microblogging service Twitter in conjunction with Google Maps, cell phone video and global positioning system technology, stage an ambush on troops in Iraq or coordinate an attack in an American ci...
Microsoft has angered Chinese computer users with its latest antipiracy move. On Tuesday, during its Global Anti-Piracy Day, Microsoft turned Windows Genuine Advantage loose on the Chinese people. Other users worldwide are familiar with WGA, which famously labeled legitimate users as pirates and dis...
The Hacker Underground is dead. Long live the Hacker Underground! In the most recent issue of Phrack Magazine, I read an article titled "The Underground Myth," that makes a number of astute points about the demise of the hacking scene of the last few decades. The author describes a technical landsca...
Two weeks ago, Republican vice presidential nominee Sarah Palin discovered that a hacker had gained access to her personal e-mail account and posted some of its contents -- both letters and photos -- on a Web site viewable by the public. The incident underscores the importance for anyone with secure...
October is the expected release date for the next version of the PCI Data Security Standard, 1.2. Since the PCI Standard's creation -- to serve as a guideline to help organizations that process card payments, prevent credit card fraud, hacking and various other security vulnerabilities and threats -...
Software is an integral part of everything we do now -- drive a car, make a phone call, turn on the TV, get on an airplane and, yes, exercise your franchise. Is this the same software that just crashed my new cell phone or sent my credit card number off to a hacker in Eastern Europe? Well, not exact...
Yes - I'm more likely to buy with flexible payment options.
Sometimes - It depends on the item and terms.
Rarely - I typically prefer paying upfront to avoid debt.
Not at All - My purchase decisions are based on need and budget.
Enter your Username and Password to sign in.