ALL POSTS The RTLO method Pieter Arntz January 9, 2014 0 Comments After my post about extensions, I received some requests to deal with another method of pretending to be a different type… Encryption is Loud and the Walls Have Ears Adam Kujawa January 8, 2014 0 Comments Seems like the interest in computer communication via sound is taking another peak in interest now that researchers discovered a way… Hard times on The Moscow Times Jérôme Segura January 7, 2014 0 Comments The Moscow Times, ‘Russia’s only daily newspaper in English’, has been a popular source of information for expatriates since it started… Life is a breach, and then you’re pwned Jean Taggart January 6, 2014 0 Comments The continuous flow of high-profile data breaches are a problem for anyone wishing to stay secure. Every time I hear about… Steer Clear of These “Free £250 ASOS Gift Voucher” Sites Christopher Boyd January 2, 2014 0 Comments What is it? The latest in a run of sites claiming to offer vouchers for well-known brands, this time focusing on… Taken down by the ‘DERP’ Joshua Cannell December 31, 2013 0 Comments An unknown hacker, who goes by the name of ‘DERP’, recent began targeting many popular video-game websites with Distributed Denial of… Give a Doge a Coin Adam Kujawa December 31, 2013 0 Comments Well, it’s happened. The internet is just a few steps away from becoming a sentient being, given life and value by… Vulnerability Found in Samsung’s Galaxy S4 Armando Orozco December 27, 2013 0 Comments Researchers from Ben-Gurion University’s security lab (BGU) discovered a vulnerability in the Samsung Galaxy S4’s Knox architecture. If exploited, the attacker… Typo Trouble in Bitcoin Land Christopher Boyd December 24, 2013 0 Comments Mt. Gox, the “World’s Largest Bitcoin exchange” might be where you want to go if you’re dabbling in Bitcoin.However, there are… Previous 1 … 581 582 583 584 585 … 614 Next Contributors Threat Center Podcast Glossary Scams