Should You Short BofA, The Next Wikileaks Victim? Seeking Alpha Wikileaks , an organization that has been discussed perhaps more than any other in recent months, had disclosed a few months ago that its next target would … and more
Twitter Challenges Gag Order, 'Fights For The User' Geeks of Doom Regardless of where you stand on Wikileak's decision to publish hundreds of previously classified US Cables, Twitter stuck up for its users and refused to …
ZORG is an open source implementation of the ZRTP protocol implementation. ZRTP provides end-to-end key exchange with Elliptic Curve Diffie-Hellmann 384bit and AES-256 SRTP encryption.
http://www.jhcis.ptho.moph.go.th/counter/logs/TAK_ash.html defaced by Ashiyane Digital Security Team
NetSupport Manager Agent suffers from a stack-based buffer overflow vulnerability.
Secunia Security Advisory – A vulnerability has been reported in Mac OS X, which can be exploited by malicious people to potentially compromise a vulnerable system.
http://www.chiangmai.go.th/actfile/1294441362.txt defaced by r3cog
State Department warns hundreds of Wikileak targets American Thinker (blog) …
WikiLeaks Cables Make Appearance in a Tale of Sunken Treasure and Nazi Theft New York Times ATLANTA — The latest twist in the WikiLeaks tale is a plot worthy of a Tom Clancy thriller. It is a story of international ..
Read this article: Johannesburg’s Traffic Lights Robbed Of SIM Cards