Just a preflight check before you take off. Reduce the chances of dyeing by choosing the right company, the right seat, the right month, the right plane. The graphic are based on stats.
Earlier this year, a sullen, 28-year-old contractor in California was charged in federal court with sabotaging the computerized controls on oil-rig sitting off the coast, allegedly out of spite for…
Apple today announced that Mac OS X v10.6 Snow Leopard will go on sale Friday, August 28 at Apple’s retail stores and Apple Authorized Resellers, and that Apple’s online store…
It’s funny what you discover sometimes when you’re doing the daily trawl of things and looking for something to blog. Today was one of those days. I was scanning through…
Here’s a fun story. Police in Australia thought they were being mighty clever when they took over an “underground hacking forum.” (The forum is r00t-y0u.org, though it seems to be down right now.) One of the hackers on the forum then retaliated by breaking into police computers using a simple SQL injection. Security fail.
SoupNazi, and 2 others “unknown” Russian hackers are been sued for one the of biggest electonic robbery grabbing more than 130 million credit and debit cards.
vulnerability in all Linux kernels since 2001
Apple on Wednesday patched 18 holes in its Mac OS X operating system, seven that could allow an attacker to remotely take over a machine when a user does nothing more than view a booby-trapped image.
Hackers at the Black Hat and DefCon security conferences have revealed a serious flaw in the way Web browsers weed out untrustworthy sites and block anybody from seeing them. If a criminal infiltrates a network, he can set up a secret eavesdropping post and capture credit card numbers, passwords and other sensitive data flowing between computers on that network and sites their browsers have deemed safe.
Vanish is a research system designed to give users control over the lifetime of personal data stored on the web or in the cloud. Specifically, all copies of Vanish encrypted data — even archived or cached copies — will becomepermanently unreadable at a specific time, without any action on the part of the user or any third party or centralized service.