Security

Microsoft introduces ultra-secure web browser

By Sterling “Chip” Camden Contributing Writer, [GAS] You must be wondering how you entered a parallel universe in which a [GAS]…

15 years ago

New Zero-Day Acrobat Reader Vulnerability

On February 19th, Adobe confirmed reports that its version 9 software of Adobe Acrobat and Adobe Reader were vulnerable to…

15 years ago

Facebook Still Owns You

By Casey Lynn Contributing Writer, [GAS] You've probably heard about the recent Facebook TOS debacle and subsequent backpeddling. After a…

15 years ago

Kevin Mitnick warns Obama’s Blackberry still hackable

By Johnny Daniels Contributing Writer, [GAS] While President Obama is going around thinking that his sparkling, very expensive new smart…

15 years ago

The Motivations Behind Computer Hacking

Pablos Holman is a futurist, IT security expert, and notorious hacker with a unique view into both breaking and building…

15 years ago

RFID Wardriving for Fun and Profit

By hooking a $250 Motorola RFID reader and an antenna to his laptop, Chris Paget was able to easily harvest…

15 years ago

Insider Plants Logic Bomb – Fannie Avoids “Final Solution”

A senior Unix administrator known only as “SK” admitted she got lucky when she found the malicious script planted in…

15 years ago

Monster.com user data stolen — again

You'd think that a Monster once bitten would be twice shy.  But even though user information has been stolen from…

15 years ago

100 Million Credit Cards Stolen in Largest Cyber Crime Ever

If you are a small company that needs to process credit card payments, you probably can't afford an expensive solution…

15 years ago

Antivirus 2009 Fail – A Good Reason to Use Linux

Can you spot anything wrong in this picture? It probably won't be what most of you will think right away.…

15 years ago