Defense Department and U.S. Senate were hijacked by hackers who used them to send spam e-mail
>> CATEGORY: Security
Reselling cell phones with camera has risks as pictures can be retrieved
libPNG 1.2.5 stack-based buffer overflow and other code concerns
Firewall Builder consists of an object-oriented GUI and a set of policy compilers for various firewall platforms
Quantum cryptography gets closer to reality
A Florida man has been charged with stealing large amounts of consumer information from Acxiom Corp., one of the world’s largest database companies. he new indictment comes on the heels…
German hacker arrested in co-operation between US and EU authorities
It is probably an understatement to say that content filtering is a contentious issue. With that in mind, Vodafone could claim it has been bold and brave, unilaterally introducing an…
The Bush administration is refusing to agree to a request to hand over information recording activities of foreign lobbyists to a journalist.
A group of underground virus writers has showed off what is believed to be the world’s first worm that can spread on advanced mobile phones, but security software companies say the virus had no malicious code attached.