Warrantless cell phone tracking on the horizon?

Warrantless cell phone tracking on the horizon?


Warrantless cell phone tracking on the horizon?

Posted: 22 Feb 2010 01:21 PM PST

There is no doubt about the fact that real time or historical tracking of criminals' movement via their cell phones can come really handy to law enforcement officers. It is certain that most of them -...

Rogue software details: Desktop Security 2010

Posted: 22 Feb 2010 07:46 AM PST

Desktop Security 2010 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\ProgramFiles\Desktop S...

Twitter users targeted by BZPharma phishing attack

Posted: 22 Feb 2010 07:41 AM PST

The latest attack on Twitter users took the form of the fascinatingly curiosity-raising phrase "Lol. This you??" and it's variants "Lol. this is me??" and "Lol, this is funny." Apparently, there a...

75% of organizations suffered a cyber attack

Posted: 22 Feb 2010 07:21 AM PST

A new Symantec study found that 42 percent of organizations rate security their top issue. This isn't a surprise, considering that 75 percent of organizations experienced cyber attacks in the past 12 ...

First 2TB 6Gb/s SAS enterprise drive

Posted: 22 Feb 2010 06:59 AM PST

Seagate is now shipping its 3.5-inch Constellation ES drive, the industry's first 2TB enterprise-class drives featuring 6Gb SAS. Designed specifically for multi-drive nearline storage environment...

New PGP Key Management Server

Posted: 22 Feb 2010 06:50 AM PST

PGP Corporation announced its new PGP Key Management Server, which delivers open enterprise key and certificate management to global organizations. Deployment and the need to manage encryption te...

Tin Hat: High security Linux

Posted: 21 Feb 2010 09:15 PM PST

Tin Hat is a Linux distribution derived from hardened Gentoo which aims to provide a very secure, stable and fast Desktop environment that lives purely in RAM. Tin Hat boots from CD, or optionally...

Week in review: Data breaches, prison terms and cyber attacks

Posted: 21 Feb 2010 09:00 PM PST

Here's an overview of some of last week's most interesting news, articles and videos: Security consultant turned hacker sentenced to 13 years in prison Max Ray Vision, a 37-year-old hacker from ...

0 comments:

Post a Comment