Please turn on your JavaScript for this page to function normally.
Will Germany’s secret service be allowed to conduct online computer searches?

According to Deutsche Welle, a German newspaper unearthed a secret document belonging to the Interior Ministry, in which is suggested that the secret service should be allowed …

FBI (partially) discloses domestic investigations and operations guidelines

Last December, the Electronic Frontier Foundation demanded of the FBI to disclose publicly their controversial Domestic Investigations and Operations Guidelines (DIOG). After …

A closer look at Microsoft Security Essentials

Microsoft has released a free (for personal use) anti-malware service that protects against viruses, spyware and other malicious software. Security Essentials is designed to …

Adobe joins SAFECode

Adobe has joined SAFECode (Software Assurance Forum for Excellence in Code), a non-profit organization dedicated to increasing trust in information and communications …

US to ease up on Internet control

Since its founding in 1998, ICANN (Internet Corporation for Assigned Names and Numbers) has been accountable only to the US government. All the agreements signed from that day …

University server breached, 163,000 social security numbers exposed

Personal information of 163,000 women has been compromised during a breach that targeted a server of the University of North Carolina’s School of Medicine. The server in …

Should the U.S. government control the Internet?

Following the recent introduction in the Senate of bills that (if passed) would allow the U.S. president to shut down the Internet in case of a cyber emergency, a lot of …

Obama appoints copyright czar

According to Wired, President Obama appointed on Friday the first “copyright czar” in U.S. history. Her name is Victoria Espinel, and the official job title is …

A closer look at IObit Security 360 1.0

IObit Security 360 is a malware and spyware removal tool that detects, removes the deepest infections, and protects your PC from spyware, adware, trojans, keyloggers, bots, …

What does the government know about you?

It seems that one of the most paranoid suppositions regarding government control of regular citizens is partly true. Wired reports that they managed to procure declassified …

SQL Injection Attacks and Defense

SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. It occurs when user input is either …

A closer look at Trend Micro HijackThis 2.0.2

HijackThis is a tiny program helps you get rid of persistent spyware by examining vulnerable or suspect parts of your system, such as browser helper objects and certain types …

Don't miss

Cybersecurity news