The future doesn't look bright for Google in China

The future doesn't look bright for Google in China


The future doesn't look bright for Google in China

Posted: 25 Feb 2010 09:12 AM PST

Google's announcement that it will leave China if the censoring of their search results continues seems not to have affected the Chinese government much. They have not showed any intention of comp...

A closer look at Comodo Dragon 1.0.0.5

Posted: 25 Feb 2010 09:07 AM PST

Comodo Dragon is a recently released free Internet browser constructed on the open source Chromium Project browser. The installation process is simple and fast. You will be asked to select the com...

How to avoid rogue security software

Posted: 25 Feb 2010 04:55 AM PST

What can you do to help prevent the spread of rogues and make sure that rogue software vendors stop profiting from their unscrupulous business? Follow these tips below to tell what's real and what's n...

Cryptome.org shut down for exposing MS surveillance guide

Posted: 25 Feb 2010 04:38 AM PST

Cryptome, the whistleblower site that serves as a repository for "documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryp...

SEO poisoning reaches a new level

Posted: 25 Feb 2010 03:35 AM PST

To improve the chances of installing their malware on random computers, scareware peddlers have decided to set up more that 60 websites that contain hundreds of possible search matches for hot/trendin...

Attackers focusing on capturing personal data

Posted: 24 Feb 2010 09:30 PM PST

Online criminals are garnering greater success with increased technical sophistication affecting a wider range of industries. With greater diversity and the use of targeted attacks, phishing remains o...

Hackers follow the money, IBM research shows

Posted: 24 Feb 2010 09:02 PM PST

Existing threats such as phishing and document format vulnerabilities have continued to expand, even as users improve security, according to a new IBM report. The X-Force report reveals three main thr...

Protect Mac applications against piracy and malicious attacks

Posted: 24 Feb 2010 09:00 PM PST

As the Mac platform continues to gain popularity, attackers are increasingly exploiting weaknesses in Mac OS X applications to invade end-user systems. This exploitation leads to application piracy, l...

0 comments:

Post a Comment