I haven’t used Norton security products for home use in years (Anyone here knows if they improved recently?), but even though if I’m not a big fan, I have to admit that the company’s last marketing campaign made me crack a smile. This week, following the same formula as their previous ads, Symantec released 2 […]
We’ve already covered Craigslist shutting down the Adult Services section of their website after controversy that a murder victim met her alleged murderer through the section. Now, Danah Boyd, writing for the Huffington Post, suggests that if the goal is to protect women, shutting down Craigslist Adult Services is counterproductive. “Rather than helping those who […]
Where do you go to get uncensored news stories? Google News? Wikileaks? Well, how about Flickr? Yes, that’s right, the photosharing site could soon be the place to go to read news stories without the detection of hostile governments. A system known as Collage, which will become publicly available on Friday, allows users to hide […]
As we had speculated, Apple is about to release a fix for a flaw in the mobile edition of Safari. The bug had been exploited by enthusiasts to allow a simple, no-computer-needed form of jailbreaking, but had the potential to be used for more sinister purposes. Although the jailbreaking technique was packaged to resemble an […]
In the following video, the folks from Mythbusters show you exactly how easy it is to beat a simple fingerprint security system, provided that you have access to an approved finger imprint, of course!
The crew behind the most prominent efforts to jailbreak Apple devices have come up with the most user-friendly way yet to jailbreak the iPhone. But the process has demonstrated some of the ironies of distributing such a technique. As we reported recently, officials have issued an official interpretation of copyright law which specifically says that […]
Being in charge of network security can be a daunting task, especially when threats mutate on a daily basis. There are loads of tools out there that help with these tasks, and one more tool has been added to the security toolkit: NetWitness Visualize. Using the enterprise full packet capture of NetWitness, it is now […]
In the following video, WikiLeaks founder Julian Assange, who’s reportedly being sought for questioning by US authorities, talks to TED’s Chris Anderson about how the controversial site operates, what it has accomplished — and what drives him. The interview includes graphic footage of a recent US airstrike in Baghdad.