Think that chatting to your friends over a Bluetooth signal will keep your discussions perfectly safe and confidential? If you do, than think again! The following video tutorial will teach you how to easily eavesdrop on almost any mobile phone conversation made through a Bluetooth headset. All it takes to get started is a laptop […]
If your servers’ services are exposed in one way or another to the Internet, having a reputable IT security firm run a scan on them might be a good idea. Qualys, a company specializing in vulnerability management, just launched a free service allowing you to scan any box that has a public IP address for […]
The Federal Bureau of Investigation employs a crack team of cryptanalysts to break ciphers that criminals use. Some ciphers are simple, such as the codes that numbers runners and other bookies use for illegal gambling. Others are a bit tougher, such as codes used between gangsters in prison and their organized crime families still on […]
By Mark O’Neill Contributing Writer, [GAS] The chances are that if you are the computer-literate member of the family, you’re probably constantly getting hit on for free IT support. You know the situation – the parents who think it’s “interesting” to install every font they can find and then wonder why it takes 30 minutes […]
By PatB Contributing Writer, [GAS] Groups of political activists or “hacktivists” that support Al Queda had been calling for a “cyber jihad” to occur yesterday, November 11th. There was never any mention of a specific target for their holy cyber war, and no one noticed any effects of their efforts. If there was a concerted […]
By PatB Contributing Writer, [GAS] Most workplaces use a proxy server or a content filter between the end user and the Internet. Such filters usually enforce a company’s web surfing policies by blocking access to pornography, social networking sites, daytrading sites, online dating, etc. As a grown adult, I don’t much care for web filtering […]
Greetings to everyone at Geeks Are Sexy! The excellent Kiltak has extended an invitation to me to guest blog security issues on this site and I was more than happy to oblige. This is my first stint at guest blogging for anyone, but I have been blogging about security issues for two years now at […]
Can you believe it? After using YouTube, PDFs, and pictures, spammers have now turned themselves to audio files in order to send you their crap and bypass your spam filters. Spammers involved in pump-and-dump scams touting penny stocks now are using MP3 music files to lure investors, a switch security experts say is the latest […]
By Fred Roth, Contributing Writer, [GAS] As of this month, the first round of Windows Vista Ultimate Extras have been sent out to customers “lucky” enough to have purchased the highest caliber of Microsoft’s newest operating system. These supplemental downloads are available through Windows Update and are described as “Cutting Edge Programs, Innovative Services and […]
In this segment of The Real Hustle, the hustlers do a recap their first season, showing all their scams – and more importantly, informing you how you can avoid them.
By Brett Williams Contributing Writer, [GAS] In one day, Yahoo acquired Zimbra, an online e-mail, document-authoring, and collaboration software suite with offline capabilities; Google officially launched its online presentation software; and on Read/WriteWeb, an article titled “Fear of Web2.0,” was posted about enterprise adoption of Web 2.0 applications.
Yes folks, more than eight emails out of every ten sent out today on the net is SPAM. Let’s face it, SMTP really needs a replacement, and while many exist out there, the current messaging infrastructure of the Internet leaves us powerless. Solutions do exist to help you filter all that spam, but regardless of […]