Techmeme

Results 1 - 10 of about 57:

Lee Munson / Naked Security:
FBI arrests alleged member of NullCrew, the group behind attacks on WHO, PBS, DHS, Comcast, Bell Canada, others   —  FBI arrests alleged NullCrew hacker  —  Federal prosecutors have arrested and charged a Tennessee man for allegedly conspiring to attack a number of businesses and educational organisations since the middle of 2012.
Jun 18, 2014, 7:50 PMIn context
John Zorabedian / Naked Security:
Viber images and videos were not encrypted during transit or storage, company says “issue has already been resolved”   —  Here we go again: Viber mobile messenger app leaves user data unencrypted  —  Viber, a mobile messenger app that allows users to make phone calls …
Apr 27, 2014, 11:45 AMIn context
Lisa Vaas / Naked Security:
Google sued for data-mining students' email   —  Google is in hot water for scanning millions of students' email messages and allegedly building “surreptitious” profiles to target advertising at them.  —  According to Education Week, a “potentially explosive” lawsuit is wending …
Mar 19, 2014, 1:55 AMIn context
Paul Ducklin / Naked Security:
Gaping admin access holes found in SoHo routers from Linksys, Netgear and others   —  For many home users, the router-slash-firewall at the edge of their network plays an vital security role.  —  It acts as a stockade to keep crooks on the internet at arms' length, typically blocking inbound network connections by default.
Jan 6, 2014, 1:20 AMIn context
Paul Ducklin / Naked Security:
Anatomy of a password disaster - Adobe's giant-sized cryptographic blunder   —  One month ago today, we wrote about Adobe's giant data breach.  —  As far as anyone knew, including Adobe, it affected about 3,000,000 customer records, which made it sound pretty bad right from the start.
Nov 5, 2013, 9:45 PMIn context
John Hawes / Naked Security:
US Army ignores shared PC login flaw, asks soldiers to keep quiet   —  A soldier was made to sign a non-disclosure agreement by the US Army after pointing out a security flaw which allowed accounts on shared PCs to be accessed without proper authentication.  —  The trivial login issue …
Sep 3, 2013, 1:50 PMIn context
Lee Munson / Naked Security:
Facebook vulnerability that allowed any photo to be deleted earns $12,500 bounty   —  An Indian electronics and communications engineer who describes himself as a “security enthusiast with a passion for ethical hacking” has discovered a Facebook vulnerability that could have allowed for any photo …
Sep 2, 2013, 3:35 PMIn context
Paul Ducklin / Naked Security:
Android random number flaw implicated in Bitcoin thefts   —  Bitcoin is often in the news, not least because it is somewhat controversial.  —  It's a digital currency, backed by cryptography, not by any central issuing authority.  —  Its “coins” are strings of bits, and anyone can generate one …
Aug 12, 2013, 11:20 AMIn context
Paul Ducklin / Naked Security:
OpenX ad servers “pre-compromised” - official distro contained remote code backdoor   —  You don't always have to break into someone's web server to get them to deliver your malware for you.  —  You may be able to implant malware onto a site from which your victim fetches third-party content …
Aug 6, 2013, 9:35 PMIn context
Graham Cluley / Naked Security:
Guardian Twitter accounts hacked by the Syrian Electronic Army   —  Twitter accounts belonging to The Guardian newspaper have fallen at the hands of hackers belonging to the Syrian Electronic Army.  —  The hackers have been making a habit of breaking into high profile Twitter accounts in recent weeks …
Apr 29, 2013, 2:30 PMIn context

Sponsor Posts

Microsoft:
Eye Gaze hackathon team helps Steve Gleason operate his wheelchair — using his eyes  —  The team devises a way to use a Kinect sensor, Microsoft robotics research and eye-tracking technology on Surface Pro 3 to navigate the wheelchair.
HP:
To Handle the Big Data Deluge, HP Plots a Giant Leap Forward  —  In 1965, Gordon E. Moore published the now-famous prediction that computer processors would double in power every two years.
VMware:
Your Grandfather's Backup Tools Weren't Built for Today's Virtual Environments.  —  When the health of your business rides on the availability of your virtual machines and the applications they run …
Zoho:
Win More Deals with Document Analytics In Zoho CRM  —  This is a guest blog post by Adam Metz, the author of Amazon #1 internet-marketing best-seller ‘The Social Customer’, and the VP of Business Development at PandaDoc.
Syncano:
Signs You Invest in a Backend as a Service  —  When you're trying to build applications quickly and efficiently, your team needs to focus on things like growth, innovation, and rapid development.