Techmeme

Results 1 - 10 of about 59:

Mark Stockley / Naked Security:
Facebook fixes vulnerability reported by security researcher that could have allowed hackers to delete photos in all albums they have permission to view   —  How one man could have deleted any photo album he could see on Facebook  —  Facebook is probably the biggest database of photographs ever compiled.
Feb 12, 2015, 10:20 AMIn context
Lisa Vaas / Naked Security:
Disgruntled employees are increasingly e-sabotaging businesses, FBI says   —  Employees with an axe to grind are increasingly sticking it to their current or former employers using e-tools such as cloud storage sites or remote access to a company's computer network, the US Federal Bureau …
Sep 25, 2014, 10:45 AMIn context
Lee Munson / Naked Security:
FBI arrests alleged member of NullCrew, the group behind attacks on WHO, PBS, DHS, Comcast, Bell Canada, others   —  FBI arrests alleged NullCrew hacker  —  Federal prosecutors have arrested and charged a Tennessee man for allegedly conspiring to attack a number of businesses and educational organisations since the middle of 2012.
Jun 18, 2014, 7:50 PMIn context
John Zorabedian / Naked Security:
Viber images and videos were not encrypted during transit or storage, company says “issue has already been resolved”   —  Here we go again: Viber mobile messenger app leaves user data unencrypted  —  Viber, a mobile messenger app that allows users to make phone calls …
Apr 27, 2014, 11:45 AMIn context
Lisa Vaas / Naked Security:
Google sued for data-mining students' email   —  Google is in hot water for scanning millions of students' email messages and allegedly building “surreptitious” profiles to target advertising at them.  —  According to Education Week, a “potentially explosive” lawsuit is wending …
Mar 19, 2014, 1:55 AMIn context
Paul Ducklin / Naked Security:
Gaping admin access holes found in SoHo routers from Linksys, Netgear and others   —  For many home users, the router-slash-firewall at the edge of their network plays an vital security role.  —  It acts as a stockade to keep crooks on the internet at arms' length, typically blocking inbound network connections by default.
Jan 6, 2014, 1:20 AMIn context
Paul Ducklin / Naked Security:
Anatomy of a password disaster - Adobe's giant-sized cryptographic blunder   —  One month ago today, we wrote about Adobe's giant data breach.  —  As far as anyone knew, including Adobe, it affected about 3,000,000 customer records, which made it sound pretty bad right from the start.
Nov 5, 2013, 9:45 PMIn context
John Hawes / Naked Security:
US Army ignores shared PC login flaw, asks soldiers to keep quiet   —  A soldier was made to sign a non-disclosure agreement by the US Army after pointing out a security flaw which allowed accounts on shared PCs to be accessed without proper authentication.  —  The trivial login issue …
Sep 3, 2013, 1:50 PMIn context
Lee Munson / Naked Security:
Facebook vulnerability that allowed any photo to be deleted earns $12,500 bounty   —  An Indian electronics and communications engineer who describes himself as a “security enthusiast with a passion for ethical hacking” has discovered a Facebook vulnerability that could have allowed for any photo …
Sep 2, 2013, 3:35 PMIn context
Paul Ducklin / Naked Security:
Android random number flaw implicated in Bitcoin thefts   —  Bitcoin is often in the news, not least because it is somewhat controversial.  —  It's a digital currency, backed by cryptography, not by any central issuing authority.  —  Its “coins” are strings of bits, and anyone can generate one …
Aug 12, 2013, 11:20 AMIn context

Sponsor Posts

Microsoft:
Microsoft introduces new Lumias and more at Mobile World Congress  —  Both devices offer the seamless integration of hardware essentials and Microsoft services to offer incredible productivity with affordability.
HP:
Behind the Scenes: Medicare and Medicaid IT Healthcare Infrastructure  —  Since the 1960s, HP has been one of the largest Medicare and Medicaid providers in the U.S. Of the 37 states that outsource Medicare and Medicaid, HP is the service provider in 20.
Zoho:
Customer Spotlight: How Noxilizer uses Zoho Campaigns to drive customer engagement  —  “The team at Zoho Campaigns, in particular, has been fabulous to work with-highly responsive and dedicated.
AWS Activate:
Startups, AWS Activate provides you with free Amazon Web Services training, virtual office hours, products and services.  —  The AWS Activate program gets your ideas and your business powered-up with AWS.  Sign up today!