Article | 19/03/2011
The RSA Hack FAQ
In the aftermath of RSA saying that its SecureID two-factor authentication tokens may have been compromised in a data breach of the company's network,...
Article | 9/03/2011
PDF files most trusted...and most targeted
PDF files are one of the most common, and most trusted document formats out there. However, that trust, combined with the cross-platform use of PDFs m...
Article | 25/01/2011
Top 10 Web hacking techniques of 2010 revealed
A Web hack that can endanger online banking transactions is ranked the No. 1 new Web hacking technique for 2010 in a top 10 list selected by a panel o...
Article | 19/01/2011
Security fail: When trusted IT people go bad
It's a CIO's worst nightmare: You get a call from the Business Software Alliance (BSA), saying that some of the Microsoft software your company uses m...
Article | 19/01/2011
ClamAV promises free antivirus app for businesses
Most of us don't like paying for antivirus (AV) software, but at least home users can rely on one of the free options, such as Microsoft Security Esse...
Article | 14/01/2011
Is Android less secure than iPhone? Um, no.
One can only hope that security software provider Trend Micro saw a nice sales boost after the proclamation of its chairman earlier this week that And...
Article | 12/01/2011
Patch Tuesday defined by the flaws that aren't fixed
Microsoft is easing in to 2011 with a light Patch Tuesday for January. There are only two security bulletins this month, and only one of those two is ...
Article | 11/01/2011
Top 10 tech scares of the decade
The dawn of the new millennium prompted fears about the future, but so far reality has not quite matched the predictions of catastrophe. The first ten...
Article | 8/01/2011
Text message of 'death' threatens smartphone security
Security researchers have shown that carefully crafted text messages sent to cell phones via short message service (SMS) can cause them to shutdown wi...
Article | 5/01/2011
The day of the password is done
When the popular Web site Gawker was hacked into recently, more than a million user IDs and passwords were released. If you were one of the people com...
Article | 30/11/2010
Free vs. fee: Free, paid antivirus programs
Depending on whom you ask, paying for antivirus software is either a good investment or a total ripoff. In reality, neither viewpoint is accurate. Yo...
Article | 14/12/2010
Goodbye Internet, we hardly knew ye?
This end-of-year article is a looking forward one -- looking forward to a year in which the Internet will be under a multi-pronged attack that threate...
Article | 11/12/2010
Something Wiki this way comes
It's been All WikiLeaks, All the Time here in Cringeville lately. And why not? As I noted last time out, this is the biggest thing to hit the WebberNe...
Article | 10/12/2010
Sydney rally backs WikiLeaks
Sydney supporters of WikiLeaks this afternoon rallied at Town Hall Square to demand the Australian government condemn Julian Assange's arrest.
Article | 9/12/2010
WikiLeaks: A case study in Web survivability
In recent weeks WikiLeaks has been targeted by denial-of-service (DoS) attacks, had its hosting service shutdown, been bounced off of Amazon hosting, ...
Article | 12/11/2010
Massive Mac OS X update shatters illusion of security
Perhaps you've heard that the Apple Mac OS X operating system is simply more secure by design and not prone to the security flaws and vulnerabilities ...
Article | 13/09/2010
Things you might not know about Facebook
Facebook has been in the media spotlight this year over privacy concerns, thanks in part cases such as the horrific murder of Sydney teenager Nona Bel...
Article | 25/08/2010
Chrome patches show the power of open source--and Google
Google's patching of vulnerabilities in its open source Chrome Web browser last week wasn't so much notable in itself; Microsoft, to be sure, is forev...
Article | 14/08/2010
Mobile apps security: Apple iOS v. Google Android
The Apple iOS, which runs on its iPhone, iPod Touch, and iPad, has a flaw in how it reads PDF documents that makes it easier to hack. This flaw is exp...
Article | 12/08/2010
12 top spy gadgets
Spies are everywhere these days, from the 10 Russians nabbed in the United States to Angelina Jolie