Featured News Posts

Recent News

Symantec scraps RSA tokens – Web/client – SC Magazine Australia – Secure Business Intelligence

  Over on the post “Symantec scraps RSA tokens – Web/client – SC Magazine Australia – Secure Business Intelligence” contains this text: “Symantec scraps RSA tokens By Darren Pauli on Jul 8, 2011 2:16 PM Filed under Web/client Managed Security Services? customers “encouraged” to dump RSA. inShare Comment Now and 3 Reactions Symantec has begun […]

Continue Reading →

Washington Post Robbed Of Over A Million Email Addresses ? Packet Storm

Over on the post “Washington Post Robbed Of Over A Million Email Addresses ? Packet Storm” contains this text: ” Washington Post Robbed Of Over A Million Email AddressesSource The InquirerLink | Favorite | Comments (0)Close”

Continue Reading →

How phone hacking worked and how to make sure you’re not a victim | Naked Security

  Over on the post “How phone hacking worked and how to make sure you’re not a victim | Naked Security” contains this text: “How phone hacking worked and how to make sure you’re not a victim Hi there! If you’re new here, you might want to subscribe to the RSS feed for updates. X […]

Continue Reading →

what happens when airlines merge…or why no ones cares once they get your cash

So the story goes something like this. bout airplane tickest a while ago…..great priceDay before try to get 2 seats together  online at check in…. That did not happen, normal not a big deal.but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife. […]

Continue Reading →

EU ministers seek to ban creation of ‘hacking tools’ – Computerworld

And next it will be books because they teach you how to create…..so therefore they allow you to create hacking tools Over on the post “EU ministers seek to ban creation of ‘hacking tools’ – Computerworld” contains this text: “EU ministers seek to ban creation of ‘hacking tools’ By Jennifer Baker June 15, 2011 07:27 […]

Continue Reading →

Microsoft plugs 34 holes; Adobe fixes Flash Player bug | InSecurity Complex – CNET News

  Over on the post “Microsoft plugs 34 holes; Adobe fixes Flash Player bug | InSecurity Complex – CNET News” contains this text: “Microsoft plugs 34 holes; Adobe fixes Flash Player bug by Elinor Mills Share 18 comments Microsoft released 16 security bulletins today fixing 34 holes, including critical holes in Windows, SMB Client and […]

Continue Reading →

The top 10 passcodes you should never use on your iPhone | Naked Security

  Over on the post “The top 10 passcodes you should never use on your iPhone | Naked Security” contains this text: by Graham Cluley on June 14, 2011 | Comments (5) FILED UNDER: Privacy, Apple, Mobile, Data loss, Featured Are you one of the many people who is using a dangerously easy-to-guess passcode on […]

Continue Reading →

Anonymous targeting Federal Reserve in next attack | InSecurity Complex – CNET News

  Over on the post “Anonymous targeting Federal Reserve in next attack | InSecurity Complex – CNET News” contains this text: “Anonymous targeting Federal Reserve in next attack by Elinor Mills Print E-mail Anonymous warns about attack on Federal Reserve in a YouTube video. (Credit: Anonymous) The Anonymous hacker group says it plans to target […]

Continue Reading →

More Mac malware – top tips for avoiding infection | Naked Security

  Over on the post “More Mac malware – top tips for avoiding infection | Naked Security” contains this text: by Paul Ducklin on June 7, 2011 | Comments (1) FILED UNDER: Apple, Featured, Malware More Mac scareware appeared overnight, with the cybercrooks following the same sort of strategy which has worked so well on […]

Continue Reading →

Lockheed Martin acknowledges ‘significant’ cyberattack

  Over on the post “Lockheed Martin acknowledges ‘significant’ cyberattack” contains this text: Lockheed Martin Saturday night acknowledged that its information systems network had been the target of a ‘significant and tenacious attack,’ but said that its security team detected the intrusion ‘almost immediately and took aggressive actions to protect all systems and data.’ No […]

Continue Reading →