Security

Defeating Hard Drive Encryption Using Ice

Horror stories about how corporations get their important data stolen from mobile devices have been plentiful in the past few…

16 years ago

The Newton Virus: Hitting a Mac near you?

The Newton virus is a perfectly inoffensive little Mac application that will never replicate itself, mail itself to your contact…

16 years ago

Prying Eyes Are Watching You

Infoworld reports on a new survey of corporate enterprises and the monitoring of their employees. Specifically, it addresses employee network…

16 years ago

Scan your files for viruses using VirusTotal

By Mark O'Neill For the past few years, I've been using AVG Anti-Virus to keep my computer safe from viruses,…

16 years ago

YouTube DoS’ed Off Net By Pakistan

There are few people who work with the Internet who understand how truly vulnerable and weak the core infrastructure really…

16 years ago

The ID theft break-in

In this segment of The Real Hustle, Jess shows why you should never, ever dump important documents in the garbage…

16 years ago

Use F-Secure’s HealthCheck to Find Security Holes

In my last post, I urged readers to patch weak applications. How do you know which ones to patch? The…

16 years ago

Patch Your Non-OS Applications

Love them or hate them, Microsoft has come a long way in making their Windows operating systems secure, mostly by…

16 years ago

Time to Upgrade Your WordPress Blogs

Yesterday, WordPress released a new version of their popular blogging software in response to a security issue. Apparently, there is…

16 years ago

Yahoo! CAPTCHA Cracked

By PatB Contributing Writer, [GAS] According to experts, one of the strongest implementations of CAPTCHA (Completely Automated Public Turing Test…

16 years ago