Want to boost your IQ? Then get online for an hour a day
Despite worries about the damaging effects of the digital age on brain development, surfing the internet can, in fact, increase IQ and boost memory in adults, scientists have found.
Despite worries about the damaging effects of the digital age on brain development, surfing the internet can, in fact, increase IQ and boost memory in adults, scientists have found.
Еще одна невероятная вещь от компании Google — мобильное приложение Gogggles, которое приоткрывает для пользователей мир наложенной реальности и визуального поиска. Вы не поверите, но уже сегодня мы можем не задумываться над тем где мы или что мы видим перед собой.
Watch the video overview of the threats expected to increase during the next year and security trends to watch for in 2010. This video covers the following emerging security exploits and 2010 security predictions from Websense Security Labs:
Every day, approximately 89.5 billion unsolicited messages (i.e. spam) are sent by computers that have been compromised and are part of a botnet.
Trend Micro released a report titled "The Future of Threats and Threat Technologies", in which they analyzed the current situation and made some predictions for 2010 and beyond.
The House of Lords questioned two security firms today on the technical measures needed to protect nations against cyber-attacks and IT infrastructure failure.
Malware writers have revamped code that uses a popular Twitter command to generate hard-to-predict domain names, a technique that brings stealth to their drive-by exploits.
Last month, the FBI warned that hacker attacks on law firms were increasing. Specifically, the Feds noticed a rise in phishing emails with malicious attachments: just one click and the user’s computer can be exploited by the hacker.
The personal information of former, prospective, and current undergraduate students at Eastern Illinois University may have been stolen when a hacker gained access to the university's Office of Admissions server.
Adobe on Tuesday patched seven vulnerabilities in Flash Player, six of them for critical bugs that hackers could use to hijack Windows, Mac or Linux machines.
SQL injection placed No. 3 on Verizon's list of the 15 most common attacks in its data breach report. Preventing SQL injections can be the difference between data security and a screaming headline. Here are a few short tips on how to help protect your databases and applications.
Вокруг нас полно гаджетов с Linux на борту, и никто не мешает учиться на ошибках профессионалов, вскрывая гаджеты и изучая. Мной была куплена "игрушка" - книгочиталка на электронных чернилах Sony Book Reader PRS-505. Вдоволь начитавшись Хайнлайна, я полез во внутренности девайса, изучить программную и аппаратную часть
Прими участие в конкурсе компании Asus и журнала Хакер!
The multiplayer leaderboards for Modern Warfare 2 on the PlayStation Network are compromised, showing records that are impossible to achieve.
Hackbloc's HackThisZine's new edition is out (version 8.0) in beautiful full-colour glossy printable pdf or old-school text-only. HackThisZine is a technology zine written by political radicals and anarchist hackers from all across the globe.
Apple has sent a clear message to any developers who try to game its iTunes App Store. Software developer Molinker has been kicked out, along with more than 1,000 of its iPhone applications.
A Romanian hacker has posted a proof-of-concept attack exploiting vulnerabilities on the Pentagon's public Website that were first exposed several months ago and remain unfixed.
Malicious web sites and botnet activity continued to dominate the cyber securiy landscape over the past 12 months, with 10 major botnets now controlling at least five million computers, according to Symantec's MessageLabs Intelligence division.
Online crime could become more direct and aggressive in the coming months, according security experts.
Virus Bulletin (VB) conducted its latest test in November, posting the results this month. The security research company evaluated 43 antimalware products (product submission deadline was October 28) for the 32-bit version of Windows 7 Professional. The basic requirements for a product passing the test is detecting, both on demand and on access, in its default settings, all malware known to be "In the Wild" at the time of the review, and not detecting any false positives when scanning a set of clean files
Citing a rising tide of complaints from people who unknowingly bought counterfeit software infected with malware, Microsoft on Thursday announced the launch of educational initiatives and enforcement actions in over 70 countries to raise awareness of counterfeit software and to protect consumers.
Miscreants took advantage of weak security to hack into two NASA-run websites over the weekend.
A renowned security researcher has started a new service allowing companies to check the strength of their WPA-PSK encryption passwords.
Cloud computing is being held back by corporate concerns about security, according to Cisco's 2009 Annual Security Report, which found that data security and the control companies have over their information are the key factors holding back full-scale adoption of the model.
Yahoo is in a legal dispute with web site Cryptome after discovering that private information regarding services provided by Yahoo to law enforcement bodies is being made publically available online.
It was rumored long ago and now it's confirmed: The Boxee Box. Made by D-Link and bringing HDMI-support, an SD card slot, two USB 2.0 ports, WiFi, and ethernet. Anticipated release is sometime in the second quarter of 2010 with an expected price tag of $200.
After 50 years and countless dead ends, incremental progress, and modest breakthroughs, artificial intelligence researchers are asking for a do-over.
Данный ролик демонстрирует работу трояна на Apple iPhone. По команде хакера осуществляется отправка СМС, совершается звонок с телефона и выполняются системные (shell) команды.
MouseExtender — это удобная и красивая панель быстрого запуска, управлять которой можно только мышкой.
Malicious iPhone apps that Apple unwittingly approves could attack even non-jailbroken iPhones, according to a developer, but security experts say this isn't earth-shattering news.
Microsoft has reportedly introduced a plan to shuffle browser choices as part of its ongoing legal negotiations with the EU.
A security researcher has released a proof-of-concept attack that exploits critical vulnerabilities that Apple patched on Thursday. The vulns stem from bugs in the Java runtime environment that allow attackers to remotely execute malicious code. Sun Microsystems patched the flaws early last month.
A popular Russian tabloid's website came under the attack of hackers, who destroyed the site's entire contents, including the editorial interface and all of the daily's archives, the editor-in-chief said.
German researchers have devised five methods that determined attackers can use to bypass hard-drive encryption in recent versions of Microsoft operating systems.
Developers of the Linux kernel have patched a bug that allowed attackers to remotely crash a machine by sending it malicious Wi-Fi signals.
Microsoft will fix 12 security flaws, including a critical Internet Explorer 8 zero-day vulnerability, with a total of six bulletins in its upcoming Patch Tuesday release.
Earier this week the Spanish Government announced plans to reform its copyright legislation so it can shut down file-sharing sites more easily. In a response to this announcement, hackers have now defaced the website of the country’s leading anti-piracy outfit, Promusicae, replacing it with a manifesto on the rights of Internet users.
Security researchers have published reports - which the company later confirmed - that Adobe's Illustrator application for graphic designers is vulnerable to a particular type of malicious exploit that could allow remote code execution on the machines.
Disgruntled employees in the U.K. have a financial incentive to tell on their employer if they suspect the software they've been using is improperly licensed.
We in the media love to stick it to the IT security bad guys: the notorious hackers or the bumbling civil servants who put nothing more than a first-class stamp on a disc containing millions of personal files.