Can you trust Chinese computer equipment?

Steven J. Vaughan-Nichols, a blogger for IT World, raised the question, but before answering it, let’s take a look at the current backdrop that should affect the …

Social networks are a danger zone

It seems that everybody is on some kind of social network these days. Checking out what our friends are doing has become part of daily routine. In today’s world, they …

Google and NSA team up to fend off future attacks

Google and the NSA reached an agreement that will see the security agency helping with the investigation of the latest attack of the Internet giant that supposedly carried out …

A closer look at File Encryption XP 1.5

File Encryption XP is a file and folder encryption program that uses the Blowfish algorithm with a 384-bit key. The files are completely self-contained which means that, if …

Police push for fast access to ISP data

According to the answers given by a 100 police investigators, they are not very satisfied with the speed with which they are able to access company documents during …

Life of a Chinese hacker

Majia is in his early twenties, and is a college graduate with a degree in engineering. During the day, he works at a government agency. But at night, he is free to follow his …

Keeping World of Warcraft accounts safe

Blizzard Entertainment is taking seriously the string of account hijacking that had as a target its World of Warcraft users in the last few years. It is only normal, since the …

Off-Twitter phishing attack explained

The mystery of the off-Twitter phishing attack, due to which some account passwords have been reset by the service, has been solved. Del Harvey, Director and leader of …