Edward Snowden joins Twitter and follows NSA
Fugitive US intelligence contractor Edward Snowden has opened an account on the social network website Twitter. His opening tweet was: “Can you hear me now?” In his profile, Mr SnowdenRead More →
Fugitive US intelligence contractor Edward Snowden has opened an account on the social network website Twitter. His opening tweet was: “Can you hear me now?” In his profile, Mr SnowdenRead More →
Pirate Bay is online and playing a game of cat and mouse with IP regulators. Pirate Bay co-founder Gottfrid Svartholm Warg was released from a Swedish prison Saturday, three years afterRead More →
VBA stands for Visual Basic for Applications and is a programming language developed by Microsoft to help programmers create Windows applications using an easy-to-understand coding syntax. According to a researchRead More →
A malicious advertising campaign has targeted top adult sites like Pornhub and YouPorn. Several of the world’s most popular pornographic websites were struck by cyberattacks in the past week, accordingRead More →
Technique allows full recovery of 2048-bit RSA key stored in Amazon’s EC2 service. Piercing a key selling point of commercial cloud computing services, computer scientists have devised a hack thatRead More →
A trojan strand targeting Android devices has been found coming pre-installed inside the firmware of some Android smartphones by Dr.Web, a Russian-based antivirus vendor. The trojan, detected as Android.Backdoor.114.origin, wasRead More →
Researchers have found that smartphone browsers can deliver a powerful flooding attack. Researchers suspect a mobile advertising network has been used to point hundreds of thousands of smartphone browsers atRead More →
The Microsoft Enhanced Mitigation Experience Toolkit, short EMET, is an optional download for all supported client and server versions of Microsoft’s Windows operating system that adds exploit mitigation to theRead More →
Yesterday’s update of the encryption software VeraCyrpt fixed two vulnerabilities that security researcher James Forshaw discovered in TrueCrypt’s source code. TrueCrypt, which has been abandoned by its developers, is stillRead More →
Tool to check malware in Twitter URLs to be tested during European Football Championships next summer. An intelligent system has been created by computer scientists to identify malicious links disguised inRead More →