Zeljka Zorz
Should the U.S. government control the Internet?
Following the recent introduction in the Senate of bills that (if passed) would allow the U.S. president to shut down the Internet in case of a cyber emergency, a lot of …
Obama appoints copyright czar
According to Wired, President Obama appointed on Friday the first “copyright czar” in U.S. history. Her name is Victoria Espinel, and the official job title is …
A closer look at IObit Security 360 1.0
IObit Security 360 is a malware and spyware removal tool that detects, removes the deepest infections, and protects your PC from spyware, adware, trojans, keyloggers, bots, …
What does the government know about you?
It seems that one of the most paranoid suppositions regarding government control of regular citizens is partly true. Wired reports that they managed to procure declassified …
SQL Injection Attacks and Defense
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. It occurs when user input is either …
A closer look at Trend Micro HijackThis 2.0.2
HijackThis is a tiny program helps you get rid of persistent spyware by examining vulnerable or suspect parts of your system, such as browser helper objects and certain types …
Report: Half way through the Month of Facebook Bugs
Half a month has passed since the start of theharmonyguy‘s project aimed at finding and posting XSS/CSRF vulnerabilities in Facebook applications. He planned to post one …
Hathaway on cyber security for the first time after leaving the White House
Former cyber security czar Melissa Hathaway addressed the public for the first time since resigning her post of Acting Senior Director for Cyberspace for the National Security …
Vast malware repository dedicated to testing and research
Frame4 Group is a Dutch company that has made its name specializing in different fields within IT: project and change management, process engineering, test coordination and …
Web 2.0 Architectures
What is Web 2.0? There is still no definitive and all-encompassing definition for the phenomenon, and there probably never will be. One thing that is known for sure is that it …
Is it possible for data to be both anonymous and useful?
The hoarding of data by companies is usually accompanied by the assurance that all the obvious identifiers (name, address, Social Security number) have been deleted – …
Google Book Search settlement: Will it include privacy rules?
It’s already common knowledge that Google intends to build the biggest, most comprehensive online library and bookstore there is. And maybe you’re thinking: …