3:11 pm - Wednesday April 23, 2014

Archive: Computer Security Subscribe to Computer Security

Security

Report: China’s developing cyber skills pose threat to U.S.

China’s strengthening cyber capabilities will complicate U.S. efforts to defend itself against industrial espionage and possible military confrontations in places such as Taiwan, according to a new congressional report released on Thursday. The...
anonymous

Anonymous Leaves Digital Clues About How They Attack After Failed Attach on the Vatican

Anonymous is one heck of a dangerous hactivist group. The collective has managed to break into and disseminate thousands of classified and downright dirty emails and records, take down dozens of major sites, all the while managing to be...
anonymouspics

Digital Playground becomes hackers’ playground

From hacking Government websites to Adult websites, is this better? The Digital Playground porn site has reportedly been hacked. Big time. The site that advertises “Porn worth paying for” may find itself paying dearly for asecurity breach...
Security

2012, the year for more IT security flaws?

There are a lot of discussions going around lately about IT security and how to protect yourself from hackers and scams. Most people think that the strength of your password will protect you from hackers, but in reality, the bulk of your...
Cellphone scam

Secret Service Hits $250 Million Cell Phone Cloning Ring

Cellphone security is an ever increasing topic of discussion, the more people use cellphones to conduct online banking, trading stocks, call family, and keep their online life organized, the more the criminals are going to want access to the...
Rootkit

Hackers Infect WordPress 3.2.1 Blogs to Distribute TDSS Rootkit

It was only a matter of time before computer hackers figured out a way to infect WordPress – a popular blogging platform. Computers security experts are still not sure how the websites are being compromised, but there are publicly known...
hackers

Stealth Hackers Jeopardize Economies, Lives, Budgets

The computer networks that make the global economy work are under constant siege by criminal groups and state-sponsored hackers who want to harm economies and the military. In the U.S., an estimated 5,000 cyber attacks go undetected each day....
2012-01-02_13-09-37_708

Judge: Order to Decrypt Laptop Does Not Violate Fifth Amendment

A Colorado judge this week ordered a woman to decrypt her laptop so that law enforcement officials could use the information against her in a pending fraud case. “I find and conclude that the Fifth Amendment is not implicated by requiring...
anonymouspics

Anonymous Takes Revenge After the Megaupload Takedown: DoJ, RIAA, MPAA, US Copyright and UM are All Offline

In an Anonymous documentary, a quote that was read by one of the members said: “Do you want to see what Anonymous is really capable of, try to shut down the message, try to censor the internet, then you’ll know what Anonymous is...
Sopa

Understanding SOPA – How It Will Affect Our Life and Your Children’s Life

You’ve heard about SOPA and PIPA, but do you really know what the law is about? this is a great short documentary explaining what SOPA and PIPA is in a very clear, simple way. It also explains how the bills will affect us in every way...