EFF Reveals How Your Digital Fingerprint Makes You Easy to Track
Think that turning off cookies and turning on private browsing makes you invisible on the web? Think again.
Think that turning off cookies and turning on private browsing makes you invisible on the web? Think again.
Graham Cluley, senior technology consultant at Sophos, explained that users of the social networking site are reacting to a mystery application that may or may not be spying on them.
Apple's new iPad device looks like it will have some of the same security issues that affect the iPhone, such as weak encryption, a mobile security expert said on Thursday.
In designing Chromium, we've been working hard to make the browser as secure as possible. We've made strong improvements with the integrated sandboxing and our up-to-date user base. We're always looking to stay on top of the latest browser security features. We've also worked closely with the broader security community to get independent scrutiny and to quickly fix bugs that have been reported.
"У кого есть инвайт на Google Wave?" — самая частая просьба на форумах и в блогах. Каждый хочет попробовать, каждый хочет оценить. Но так ли крут сервис, насколько желанным он стал для огромного числа пользователей? В этом мы и решили разобраться, собрав ответы на самые частые вопросы.
Совсем недавно мы тестировали топовый NAS от NETGEAR – ReadyNAS Pro. По скоростным результатам он оказался рекордсменом, но его непомерно высокая стоимость (даже в варианте без дисков) может отпугнуть и "богатенького буратино"
A total of 5.5 million Web pages on more than 560,000 Websites were infected in the fourth quarter, according to new data, with evidence that attackers are waging less noticeable exploits in order to remain under the radar.
Russian hackers get a “gold medal” for fraud, but their Chinese counterparts carried out more than half of all the cybercrimes committed last year, according to Kaspersky Lab, Russia’s largest antivirus software developer.
A Nebraska man is expected to plead guilty next week to launching a cyber attack that shut down the Church of Scientology's Web sites, federal prosecutors said Monday.
Five Web sites run by Chinese human rights activists were attacked by hackers over the weekend, as a separate row continued between Google and China over political cyberattacks.
The administrators of the Tor anonymiser network are urging users to upgrade their software in the wake of a security breach. A total of three servers belonging to the network were compromised in an attack by unidentified hackers who proceeded to use the machines as a base to launch other attacks. The affected servers have since been "refurnished," according to the team.
Google has announced version 4.0 of its browser Chrome. Available for Windows only, it fixes 13 bugs and improves synchronization of extensions.
The hackers who infiltrated the computer systems of Google earlier this month first carried out sophisticated reconnaisance and may even have posed as friends of Google employees, according to McAfee chief technology officer George Kurtz.
Computer scientists in Britain have uncovered weaknesses in electronic passports issued by the US, UK, and some 50 other countries that allow attackers to trace the movements of individuals as they enter or exit buildings.
A Texas bank is suing a customer hit by an $800,000 cybertheft incident in a case that could test the extent to which customers should be held responsible for protecting their online accounts from compromises.
A conservative activist who posed as a pimp to target the community-organizing group ACORN and the son of a federal prosecutor were among four people arrested by the FBI and accused of trying to interfere with phones at Louisiana Sen. Mary Landrieu's office.
Зима набирает обороты, на улице становится крайне холодно и совсем не комфортно. Сбегая от мороза, мы прячемся в оазис тепла – любимый дом. Но, придя домой, нужно уметь правильно согреться. Оказывается и здесь есть несколько нюансов.
В Декабре прошлого года мы разыгрывали процессор AMD Phenom II X4 965 Black Edition от компании OLDI Computers, спрашивая вас о рекордах и инновациях компании AMD. В общей сложности мы получили более 200 ответов и победителем решили признать Клишева Игоря Борисовича, который написал следующее:
At least three US oil companies were victims of highly targeted, email-borne attacks designed to siphon valuable data from their corporate networks and send it abroad, according to a published report citing unnamed people and government documents.
An update to Kaspersky's popular anti-virus software on Monday falsely identified Google Adsense as a malicious script.
Google today added support for extensions and bookmark synchronization to the production version of Chrome for Windows.
Hackers hit five Chinese human rights groups with distributed denial of service attacks over the weekend. Among the targeted sites was Chinese Human Rights Defenders, which was hit by a 16 hour attack, beginning on Saturday, according to the site.
Microsoft's Internet Explorer could inadvertently allow a hacker to read files on a person's computer, another problem for the company just days after a serious vulnerability received an emergency patch.
If you think spam attacks were bad in 2009, just wait until 2010 gets going.
The cyber attacks against Google, Adobe and a raft of other top U.S. corporations late last year were by most accounts sophisticated and targeted attempts to steal proprietary data. But lost in all of the resulting media hoopla over who the remaining victims were and whether Chinese hackers or indeed the Chinese government itself were responsible is the simple, terrifying truth that individual hackers now have access to the same arsenal of cyber weapons once reserved only for nation states.
Считается, что для работы со слепыми SQL, инъекциями требуется отправлять сотни запросов на сервер. Но на самом деле это не так! В этом видеоролике ты увидишь самые быстрые и современные методы работы с подобными уязвимостями
A widget based on Adobe's Flash Player was disabled by Twitter after a security analyst notified the company of a weakness permitting access into targeted user accounts.
The hackers who stole and published 33 million passwords from the Rockyou.com website in December needn't have bothered, a security company has revealed. Many of them were so trivial they could have been guessed anyway.
The Free Software Foundation (FSF) is taking its anti-Microsoft campaign global.
Microsoft first knew of the bug used in the infamous Operation Aurora IE exploits as long ago as August, four months before the vulnerability was used in exploits against Google and other hi-tech firms in December, it has emerged.
The vast majority of US federal agencies have failed to meet a December 31 deadline to deploy new technology that would make it significantly harder for attackers to spoof their websites, according to Network World.
The Tor Project, a service that provides privacy and anonymity to Web users, said hackers broke into two of its servers and used the CPU and bandwidth to launch additional attacks.
George Hotz, aka Geohot, known for creating jailbreaking/unlocking tools for the iPhone and iPod touch, claims to have hacked the Playstation 3.
Hackers cracked into the credit card processing networks of several popular restaurant chains in Korea from December through early this year, obtaining personal information from customers to make fake cards and ring up millions of won in purchases.
Computer scientists in the US have discovered ways to "re-identify" the names of people included in supposedly anonymous datasets.
В ролике наглядно показывается удобство использования новых способов Local и Remote File Include. Хакер демонстрирует методы инклуда через протокол data, через символические ссылки и локальные переменные в proc, через отправку и чтение email локального пользователя
The targeted cyber attacks apparently originating in China that hit Google and more than 30 other companies late last year are now targeting some U.S. defense contractors, according to security vendor F-Secure.
Robotics company Willow Garage is giving 10 of its robots free to researchers in return for a promise that they will share their development efforts with the open-source community.
Verizon is terminating internet service to an unknown number of repeat copyright scofflaws, a year after suggesting it was not adopting a so-called graduated-response policy.
Network Solutions, the well-known U.S. hosting provider and domain registrar that manages over 6.6 million domain names, confirmed on Tuesday that their servers have been breached and that a few hundred of their customer's web sites have been defaced by unknown attackers who have replaced the home pages with the following: