New Norton Ad Campaign Features The Hoff and Dolph Lundgren

I haven’t used Norton security products for home use in years (Anyone here knows if they improved recently?), but even though if I’m not a big fan, I have to admit that the company’s last marketing campaign made me crack a smile. This week, following the same formula as their previous ads, Symantec released 2 […]


Has the takedown of Craigslist Adult Services hurt abused women?

We’ve already covered Craigslist shutting down the Adult Services section of their website after controversy that a murder victim met her alleged murderer through the section. Now, Danah Boyd, writing for the Huffington Post, suggests that if the goal is to protect women, shutting down Craigslist Adult Services is counterproductive. “Rather than helping those who […]

Censorship victims get a Flickr of hope

Where do you go to get uncensored news stories? Google News? Wikileaks? Well, how about Flickr? Yes, that’s right, the photosharing site could soon be the place to go to read news stories without the detection of hostile governments. A system known as Collage, which will become publicly available on Friday, allows users to hide […]

Simple iPhone jailbreak doomed by security fears

As we had speculated, Apple is about to release a fix for a flaw in the mobile edition of Safari. The bug had been exploited by enthusiasts to allow a simple, no-computer-needed form of jailbreaking, but had the potential to be used for more sinister purposes. Although the jailbreaking technique was packaged to resemble an […]

How To Beat a Fingerprint Security System

In the following video, the folks from Mythbusters show you exactly how easy it is to beat a simple fingerprint security system, provided that you have access to an approved finger imprint, of course!

Jailbreaking gets its own iPhone “app”

The crew behind the most prominent efforts to jailbreak Apple devices have come up with the most user-friendly way yet to jailbreak the iPhone. But the process has demonstrated some of the ironies of distributing such a technique. As we reported recently, officials have issued an official interpretation of copyright law which specifically says that […]

Netwitness Visualize: Bringing Network Data Extraction and Assembly to the Next Step

Being in charge of network security can be a daunting task, especially when threats mutate on a daily basis. There are loads of tools out there that help with these tasks, and one more tool has been added to the security toolkit: NetWitness Visualize. Using the enterprise full packet capture of NetWitness, it is now […]

Why the world needs WikiLeaks

In the following video, WikiLeaks founder Julian Assange, who’s reportedly being sought for questioning by US authorities, talks to TED’s Chris Anderson about how the controversial site operates, what it has accomplished — and what drives him. The interview includes graphic footage of a recent US airstrike in Baghdad.