Legal wiretap mechanisms may be open to abuse within ISPs |
- Legal wiretap mechanisms may be open to abuse within ISPs
- Ironkey looks to secure mobile, business banking
- AirTight defends Wi-Fi WPA2 'vulnerability' claim
- FBI rings organizers over Defcon contest
- Facebook, nannying, and objectives
- Black Hat gets its video feed hacked
- U.S. should seek world cooperation on cyber conflict, says ex-CIA director
- Former student files second lawsuit over school Webcam spying
- Important Lessons from the Black Hat ATM Hack
- The Facebook Data Torrent Debacle: Q&A
- Google cleared over StreetView WiFi snooping
- Open source web apps often insecure, new tool discovers
- Verizon: Data breaches often caused by configuration errors
- Details from 100 million Facebook profiles posted online
- Rogue Android Apps Secretly Grab User Data
- Google crowned 'king of malware'
- ICO: Google Wi-Fi data didn't contain personal information
- Malware openly available in China, researchers say
- Android App Data Theft: Advantage Apple?
- Microsoft's bug reports fail to produce prompt patches
Legal wiretap mechanisms may be open to abuse within ISPs Posted: 30 Jul 2010 09:00 AM PDT |
Ironkey looks to secure mobile, business banking Posted: 30 Jul 2010 09:00 AM PDT |
AirTight defends Wi-Fi WPA2 'vulnerability' claim Posted: 30 Jul 2010 09:00 AM PDT |
FBI rings organizers over Defcon contest Posted: 30 Jul 2010 09:00 AM PDT |
Facebook, nannying, and objectives Posted: 30 Jul 2010 09:00 AM PDT |
Black Hat gets its video feed hacked Posted: 30 Jul 2010 09:00 AM PDT |
U.S. should seek world cooperation on cyber conflict, says ex-CIA director Posted: 30 Jul 2010 09:00 AM PDT |
Former student files second lawsuit over school Webcam spying Posted: 29 Jul 2010 09:00 AM PDT |
Important Lessons from the Black Hat ATM Hack Posted: 29 Jul 2010 09:00 AM PDT A security researcher named Barnaby Jack amazed attendees at the Black Hat security conference by hacking ATM machines in a session titled "Jackpotting Automated Teller Machines Redux". There are some important lessons to be learned from the hacks Jack demonstrated, and they apply to more than just ATM machines. |
The Facebook Data Torrent Debacle: Q&A Posted: 29 Jul 2010 09:00 AM PDT Security concerns over Facebook have been raised yet again after a security consultant collected the names and profile URLs for 171 million Facebook accounts from publicly available information. The consultant, Ron Bowes, then uploaded the data as a torrent file allowing anyone with a computer connection to download the data. |
Google cleared over StreetView WiFi snooping Posted: 29 Jul 2010 09:00 AM PDT |
Open source web apps often insecure, new tool discovers Posted: 29 Jul 2010 09:00 AM PDT |
Verizon: Data breaches often caused by configuration errors Posted: 29 Jul 2010 09:00 AM PDT |
Details from 100 million Facebook profiles posted online Posted: 29 Jul 2010 09:00 AM PDT |
Rogue Android Apps Secretly Grab User Data Posted: 29 Jul 2010 09:00 AM PDT A number of popular Android applications can reportedly collect your mobile device's personal information and then send that data to a Chinese-owned Website. The information in question includes your device's phone number, subscriber identifier number and, in some cases, your voicemail password, according to Phandroid. |
Google crowned 'king of malware' Posted: 29 Jul 2010 09:00 AM PDT |
ICO: Google Wi-Fi data didn't contain personal information Posted: 29 Jul 2010 09:00 AM PDT |
Malware openly available in China, researchers say Posted: 29 Jul 2010 09:00 AM PDT |
Android App Data Theft: Advantage Apple? Posted: 29 Jul 2010 09:00 AM PDT |
Microsoft's bug reports fail to produce prompt patches Posted: 29 Jul 2010 09:00 AM PDT |
You are subscribed to email updates from "Cisco" via ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment