The state of encryption in Europe

It is a well know fact that IT employees are a special breed. They may be seen as overly paranoid and sometimes very singleminded and demanding about the issue of security and …

Digital fingerprints to identify hackers

How can you retaliate against a cyber attacker if you don’t know who he is? As we have witnessed lately, attribution of an attack is quickly becoming one of the biggest …

Hackers prey on Google workers’ friends

It has been discovered that the hackers who mounted the attacks on Google, Adobe and other companies recently breached, have targeted friends of employees that had access to …

US oil industry targeted by cyber attacks

It seems that the high profile breaches of Google and Adobe have been just the latest target in the Chinese march through US networks. ExxonMobil, Marathon Oil and …

The dangers of selling online

Buying online can get you scammed, for sure – but what about selling? You may think that you wouldn’t give up the item without seeing hard cash in your hand or the …

Deep packet inspection – illegal or not?

Virgin Media’s plan to monitor traffic on its networks to assess the percentage and nature of illegal file-sharing may be soon hitting a roadblock, since Privacy …

Using spam to beat spam

How to make a full-proof spam filter that will not block any of the legitimate email? A team at the International Computer Science Institute in Berkeley, California, and the …

Blippy, a great service for phishers?

Blippy, a new service that lets you twitter (blipper?) your recent purchases made with a credit card of your choice, could be a valuable tool for cyber criminals, warns …