online safety - News, Features, and Slideshows
Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing and where those websites are hosted.
By Lucian Constantin | 31 July, 2015 06:29
The former administrator of Darkode, the online cybercrime forum that was recently shut down by law enforcement agencies, is preparing to bring it back, with better security and privacy for its members.
By Lucian Constantin | 29 July, 2015 03:20
Microsoft will make it easier for people to request the removal of links to intimate images or videos from the company's Bing search engine if such content was posted online without their consent.
By Lucian Constantin | 23 July, 2015 02:57
There's an old saying in the security community: Attacks always get better. The latest case where that holds true is for the aging RC4 cipher that's still widely used to encrypt communications on the Internet.
By Lucian Constantin | 17 July, 2015 00:38
Go ahead and update Java -- or disable it if you don't remember the last time you actually used it on the Web: Oracle's latest patch, released Tuesday, fixes 25 vulnerabilities in the aging platform, including one that's already being exploited in attacks.
By Lucian Constantin | 15 July, 2015 22:21
The huge cache of files recently leaked from Italian surveillance software maker Hacking Team is the gift that keeps on giving for attackers. Researchers sifting through the data found a new exploit for a previously unknown vulnerability in Adobe's Flash Player.
By Lucian Constantin | 12 July, 2015 04:18
Cisco Systems plans to pay $US635 million in cash to buy OpenDNS, a company that leverages the Domain Name System (DNS) to provide security services including Web filtering, threat intelligence and malware and phishing protection.
By Lucian Constantin | 01 July, 2015 01:19
Many commercial software companies and enterprise in-house developers are churning out applications that are insecure by design due to the rapid and often uncontrolled use of open-source components.
By Lucian Constantin | 16 June, 2015 22:00
Adobe Systems fixed 13 security issues in Flash Player that could lead to serious attacks, including remote code execution and information disclosure.
By Lucian Constantin | 10 June, 2015 05:01
A researcher is warning that a gaming plug-in installed on over 200 million PCs contains a flaw that could let attackers steal users' data from websites they're logged into, such as their Web mail and social networking accounts.
By Lucian Constantin | 05 June, 2015 01:03
In yet another testament of the awful state of home router security, a group of security researchers uncovered more than 60 vulnerabilities in 22 router models from different vendors, most of which were distributed by ISPs to customers.
By Lucian Constantin | 02 June, 2015 22:05
Identifying users who access Tor hidden services -- websites that are only accessible inside the Tor anonymity network -- is easier than de-anonymizing users who use Tor to access regular Internet websites.
By Lucian Constantin | 30 May, 2015 02:48
The majority of 3G and 4G USB modems offered by mobile operators to their customers have vulnerabilities in their Web-based management interfaces that could be exploited remotely when users visit compromised websites.
By Lucian Constantin | 29 May, 2015 02:44
By embedding an e-paper display in the back of credit and debit cards, payment specialist Oberthur Technologies hopes to make online fraud a lot more difficult. An upcoming test in France will show if the underlying technology can cut it.
By Mikael Ricknäs | 21 May, 2015 03:50
Cloud, big data and analytics, mobile, social, and IT security have impacted networking – bringing it almost to breaking point. This whitepaper looks at the future of networking to accommodate these evolving trends.
When implementing a new BYO program, you might need to modify existing policies and create new user agreements that help obtain employee acceptance of new policies. This whitepaper looks at the best practices for creating these policies that can help you construct your own successful user agreement for Desktop Workspace or another BYO solution.
- Lawmakers propose new visa for foreign tech entrepreneurs
- Microsoft bests Google in patent case appeal
- Yahoo picks up fashion commerce site Polyvore
- Mt. Gox CEO Karpeles arrested by Japanese police
- Facebook says Flash security woes could hurt its business
- IBM fattens patent portfolio in cloud tech
- Microsoft scores with free Windows 10 upgrade as downloads tally 10x Windows 8's first-day sales
- It's SysAdmin Day: Let us celebrate with coffee
- ISP argues net neutrality rules violate its right to block content
- Former Hacking Team developer reportedly in contact with a terrorist group
- Italian police shutter Dark Web marketplace
- Black Hat 2015: Cracking just about anything
- Android Studio focuses on C++ editing
- New Google Glass for businesses will reportedly attach to other eyewear
- Ad group urges FTC to reject right to be forgotten in US