-
January 8, 2014
How Target’s Credit Card Security Breach Could Have Been Avoided
How Target’s Credit Card Security Breach Could Have Been Avoided: When thieves broke into the point-of-sale (POS) system at Target, they stole the data from the magnetic stripe on the back of credit and debit cards. Target, like virtually all other stores in the United States, depends on that information on the magnetic stripe to […]
-
January 8, 2014
Bitcoin is the Linux of payments. And its killer apps will be for US dollars.
Bitcoin is the Linux of payments. And its killer apps will be for US dollars.: I was scanning the news the other day, and someone on Hacker News mentioned that half the items above the fold on StreetEYE were about Bitcoin. And I said to myself, I haven’t seen the neckbeards this excited since the […]
-
January 8, 2014
Facebook Hit With Lawsuit: Could Mistrust Spell The End Of The Social Giant?
Facebook Hit With Lawsuit: Could Mistrust Spell The End Of The Social Giant?: Facebook, the popular social network with over a billion users world wide, has just been hit with a class-action lawsuit. The allegations, revealed in the FT, are that Facebook systematically scans the content of private messages so it can sell the data […]
-
January 8, 2014
Security Experts Pull Out of RSA Conference in NSA Protest
Security Experts Pull Out of RSA Conference in NSA Protest: At least six speakers have withdrawn from the February 2014 RSA Conference, one of the top cybersecurity events of the year, in protest over allegations that EMC’s RSA security division accepted $10 million to essentially create a backdoor in one of its products. Mikko Hyppönen, chief research officer for […]
-
January 8, 2014
openSUSE Forum hacked. Pakistani hacker compromised internal database
openSUSE Forum hacked. Pakistani hacker compromised internal database: A Pakistani hacker named ‘H4x0r HuSsY’ has successfully compromised the official Forum of the popular Linux OS openSUSE accessing to the database. A Pakistani hacker named ‘H4x0r HuSsY’ has successfully compromised the official Forum of the popular Linux OS openSUSE. The new shocking hack is shaking the […]
-
January 8, 2014
Intel phases out McAfee brand name, distancing itself from controversial founder John McAfee
Intel phases out McAfee brand name, distancing itself from controversial founder John McAfee: When you think of McAfee, you might think of the Intel-owned antivirus software company, or you might think of the former druggie and part-time fugitive who founded that company over 20 years ago. Or perhaps both. Either way, Intel is attempting to sever […]
-
January 8, 2014
Intel phases out McAfee security brand
Intel phases out McAfee security brand: Intel has announced that, as it introduces new security products, it will replace the McAfee brand with that of ‘Intel Security’. The red shield logo will remain to represent the core values of security and protection, Intel said, while the re-branding is set to begin immediately. Intel said it […]
-
January 8, 2014
Cyberwar, high-tech weapons take center stage in defense budget
Cyberwar, high-tech weapons take center stage in defense budget: The $552.1 billion defense budget approved by Congress calls for new regulations on cyberweapons — an effort to prevent the pervasive digital bombs from further spreading throughout the world — at the same time that it dramatically boosts spending on them. Section 940 of the National […]
-
January 8, 2014
System Resource Consumption DDoS Attacks and Mitigation Methods
System Resource Consumption DDoS Attacks and Mitigation Methods: The Transmission Control Protocol (TCP) provides connection-oriented, reliable and octet-stream-based communication service at the transport layer. The application layers of diverse hosts are always in need of reliable connections, but the IP layer fails to present such a stream mechanism. In reality, such requirements are almost always […]
-
January 7, 2014
Avoid Phone Scams
Avoid Phone Scams: Cybercriminals don’t just send fraudulent email messages and set up fake websites. They might also call you on the telephone and claim to be from Microsoft. They might offer to help solve your computer problems or sell you a software license. Once they have access to your computer, they can do the […]