Zeljka Zorz
September: Month of Facebook bugs
There is an interesting project started by a security researcher that goes by the handle theharmonyguy. Using as a inspiration the “Month of Twitter Bugs”, he …
The Bento Book: Beauty and Simplicity in Digital Organization
Bento is a database for people who need more than a spreadsheet, but less than a full-fledged complex database. It was designed with Mac users in mind, and integrates Mail, …
What do we know about the Conficker worm?
According to John Markoff, we know what the Conficker worm does and how it does it, but little else. Who made it? What purpose does or will the network of 5 million zombie …
WPA TKIP encryption cracked in a minute
Robert McMillan from IDG News Service reports that two Japanese scientist from the Hiroshima and Kobe Universities found a way to crack the WPA encryption system in wireless …
A closer look at Kaspersky Internet Security 2010
Kaspersky Internet Security is security software that offers protection against viruses, spyware, spam, identity theft and phishing. It also has parental and privacy controls. …
Most charges dropped against San Francisco’s rogue admin
A little more than a year has passed since Terry Childs has been arrested. An administrator of San Francisco’s FiberWAN network, he has been accused of four separate …
Internet vault with built-in data inheritance
DataInherit, a new online data storage service with built-in data inheritance has been offered by DSwiss AG, a Swiss bank for information assets owned partly by Avantec. …
GFI Network Security and PCI Compliance Power Tools
GFI LANguard is one of the most deservedly popular commercial network security tools there is. It's an administrator's dream software, a "3 for 1 deal" - it finds, assess and …
Google banned from the streets of Switzerland
Ars Technica reports that only a few days days passed from the launching to the withdrawal of Google Street View in Switzerland. The Google tool with which you can see streets …
The crime organizations behind most cyber criminal activity
Money makes the world go around. Those who don’t have it, want it, and those who have it – want more of it. Organized crimes operations are know for their …
10 software apps for encryption for the Mac
In this day and age, nobody can afford NOT to use encryption, and the sooner we all get used to using it on a daily basis, the better. We live in a world where secrets are …
Googling Security: How Much Does Google Know About You?
Have you ever thought about the price you pay for using Google's services? They say it's all for free, but you're actually paying for it by allowing them to collect personal …
Featured news
Resources
Don't miss
- Your dependencies are 278 days out of date and your pipelines aren’t protected
- Security debt is becoming a governance issue for CISOs
- BlacksmithAI: Open-source AI-powered penetration testing framework
- When cyber threats start thinking for themselves
- IronCurtain: An open-source, safeguard layer for autonomous AI assistants