FBI wants social networks and IM services to be wiretap-friendly

FBI wants social networks and IM services to be wiretap-friendly


FBI wants social networks and IM services to be wiretap-friendly

Posted: 07 May 2012 09:13 AM PDT

Worried that technology advances will leave its agents incapable of conducting surveillance of online communications of potential criminals, the FBI is quietly lobbying top Internet companies not to o...

Government workers unprotected against visual data leakage

Posted: 07 May 2012 08:35 AM PDT

Oculis Labs released results from its "Government Worker Privacy" survey on privacy risks for mobile workers. 104 people were randomly surveyed at this year's FOSE conference and exposition in Washing...

IEEE approves revision of wireless LAN standard

Posted: 07 May 2012 08:29 AM PDT

IEEE announced the publication of IEEE 802.11-2012, which defines the technology for the world's premier wireless LAN products. The new IEEE 802.11-2012 revision has been expanded significantly b...

Is a German criminal behind the latest ransomware campaign?

Posted: 07 May 2012 08:03 AM PDT

Ransomware distribution campaigns are coming fast one after the other and its usually difficult - if not downright impossible - to discover anything about the criminals behind them. But Roman Hussy...

Ransomware increases in prevalence as cyber-criminal tactic

Posted: 07 May 2012 06:25 AM PDT

In the first quarter of 2012 alone, six million new malware samples were created, following the trend of increasingly prevalent malware statistics of previous years, according to PandaLabs. Trojans...

Adobe patches Flash Player hole exploited in the wild

Posted: 07 May 2012 06:09 AM PDT

Adobe has released a security update for Flash Player for Windows, Macintosh, Linux and Android that address the object confusion vulnerability (CVE-2012-0779) that is currently being used in the wild...

Phishers mimic OpenID to steal credentials

Posted: 07 May 2012 05:58 AM PDT

New spam email campaigns are taking advantage of the users' vague familiarity with the OpenID authentication method to phish their login credentials for a number of different and popular online servic...

Situational awareness platform uses power of big data

Posted: 07 May 2012 05:57 AM PDT

Despite all the promises made by SIEM vendors over the last decade, enterprise security analysts often have no way to know if their IT systems have been compromised by an APT or insider attack. I...

Windows applications on iOS

Posted: 07 May 2012 04:08 AM PDT

GraphOn announced its GO-Global iOS client. Available immediately as a free downloadable app from the App Store, the new client is used in conjunction with GraphOn's GO-Global Windows Host solution to...

NetShade 5: Anonymous proxy for the Mac

Posted: 06 May 2012 09:21 PM PDT

NetShade makes your presence on the web anonymous by routing your connection through a proxy server. It keeps you from leaving your digital "calling card" at every site you visit. Instead of your...

Theory of Computation

Posted: 06 May 2012 09:03 PM PDT

Offering an accessible approach to the topic, Theory of Computation focuses on the metatheory of computing and the theoretical boundaries between what various computational models can do and not do—fr...

Week in review: Sizing up botnets, Conficker still alive and kicking, and a new exploit kit spotted in the wild

Posted: 06 May 2012 09:02 PM PDT

Here's an overview of some of last week's most interesting news, podcasts and articles: What's in your daily slice of spam? Bitdefender decided to look at just what spam – the e-mail version – c...

0 comments:

Post a Comment