|
|  | Hacking gets down to business 11.03.2012 10:09 AM Analysis: Tech security has something in common with the Industrial Revolution. Both transformed four key aspects of society: innovation, transportation, communication and financial markets. | |
|
|  | Adobe, now 'married' to Microsoft, moves Flash updates to Patch Tuesday 11.07.2012 1:05 PM Adobe on Tuesday announced that it will pair future security updates for its popular Flash Player with Microsoft's Patch Tuesday schedule. | |
|
|  | Prepare your business for digital disaster 11.03.2012 1:59 PM Whether thieves or tornadoes threaten your company, protecting your assets from utter catastrophe is easier than you think. | |
|
|  | Anonymous protests planned over government surveillance 11.04.2012 7:25 AM The shadowy hacker collective is upset over the tracking and profiling of citizens. | |
|
|  | Vupen security researchers finger Windows 8 holes 11.04.2012 10:30 AM Security researchers at Vupen say they've identified a flaw in Windows 8 that allows remote code execution. The complexity of the operating system means it's unlikely to ever be bulletproof, the security firm says. | |
|
|  | Peek behind abbreviated Web links with Unshorten.it 11.05.2012 5:55 AM Not sure where that tiny URL will lead? This handy service/browser extension will tell you if it's safe. | |
|
|  | Study finds 25 percent of Android apps to be a security risk 11.05.2012 6:07 AM A review by Bit9 of Android Apps in the Google Play market found over 100,000 that are "questionable" or "suspicious". | |
|
|  | Consumers trade privacy for free apps, study shows 11.05.2012 9:05 AM Free apps distributed through the Google Play market are three times more likely to seek access to customer information in exchange for not charging for use, research by Juniper Networks reveals. | |
|
|  | Symantec, PayPal, ImageShack targeted in hactivist attacks 11.05.2012 11:37 AM Different hacker groups claim to have breached servers belonging to ImageShack, Symantec, PayPal, and other organizations. | |
|
|  | Security through obscurity: How to cover your tracks online 11.05.2012 12:30 PM From Tor to steganography, these six techniques will help obscure the data and traces you leave online | |
|
|
No comments:
Post a Comment