BBC News – Russia gang hacks 1.2 billion usernames and passwords
http://m.bbc.com/news/technology-28654613 Posted from WordPress for Android →
http://m.bbc.com/news/technology-28654613 Posted from WordPress for Android →
http://www.wired.com/2014/08/wireless-car-hack Posted from WordPress for Android →
IEEE has an interesting article Bitcoin Gets Its Own TV Network that tells that in September 2014, if all goes according to plan, the Bitcoin blockchain will take to the radio waves in Finland. The project is called Kryptoradio. Koodilehto and FIMKrypto have secured the rights to transmit updates to the Bitcoin blockchain across digital →
Computer users pass around USB sticks like silicon business cards. Why the Security of USB Is Fundamentally Broken http://www.wired.com/2014/07/usb-security/ article tells that we typically depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than →
http://boingboing.net/2014/07/28/human-rights-watch-report-sur.htm Posted from WordPress for Android →
http://spectrum.ieee.org/tech-talk/telecom/security/leaked-british-spy-catalog-reveals-tools-to-manipulate-online-information Posted from WordPress for Android →
This week marks the year of Edward Snowden NSA revelations began. I have covered news on NSA relevations on my blog pretty much (Security trends 2013 and Security trends 2014). Register magazine article NSA: Inside the FIVE-EYED VAMPIRE SQUID of the INTERNET is a good wrap-up of what has been revealed over the years and →
Are you writing software that needs to be secure? Quite probably. Security critical programs include application programs used as viewers of remote data, web applications (including CGI scripts), network servers, and setuid/setgid programs. Secure Programming for Linux and Unix HOWTO — Creating Secure Software on-line book provides a set of design and implementation guidelines for →
A port scanner is a software application designed to probe a server or host for open ports. This is often used by administrators to verify security policies of their networks and by attackers to identify running services on a host. The de facto standard for port scanning always has been the venerable Nmap program. The →
News on the problems on Internet security have been very frequent during last 12 months, and there does not seem to be any stop on news on Internet security problems. The news started with NSA relevations that showed ho much NSA spied on the Internet users and how it has weakened the technologies used to →