Shahid Sharif

Shahid Sharif


Registered on Saturday the 12th of Apr, 2008

Website: http://www.secunoid.com
Facebook: http://www.facebook.com/secunet

Posts by Shahid Sharif ¬

  1. Jun 10, 2020Security News for 10Jun2020
  2. Jun 9, 2020Security News for 9Jun2020
  3. Jun 8, 2020Security News for 8Jun2020
  4. Jun 4, 2020Security News for 4Jun2020
  5. Jun 3, 2020Cyber Security News for 3Jun2020
  6. Jun 2, 2020Cyber Security News for 2Jun2020
  7. Jun 1, 2020Cyber Security News for 1Jun2020
  8. May 29, 2020Cyber Security News for 29May2020
  9. May 28, 2020Cyber Security News for 28May2020
  10. May 27, 2020Cyber Security News for 27May2020
  11. May 26, 2020Cyber Security News for 26May2020
  12. May 25, 2020Cyber Security News for 25May2020
  13. May 22, 2020Cyber Security News for 22May2020
  14. May 21, 2020Cyber Security News for 21May2020
  15. May 20, 2020Cyber Security News for 20May2020
  16. May 15, 2020Cyber Security News for 15May2020
  17. May 14, 2020Cyber Security News for 14May2020
  18. May 13, 2020Cyber Security News for 13May2020
  19. May 12, 2020Cyber Security News for 12May2020
  20. May 11, 2020Cyber Security News for 11May2020
  21. May 8, 2020Cyber Security News for 8May2020
  22. May 7, 2020Cyber Security News for 7May2020
  23. May 6, 2020Cyber Security News for 6May2020
  24. May 5, 2020Cyber Security News for 5May2020
  25. May 4, 2020Cyber Security News for 4May2020
  26. May 1, 2020Cyber Security News for 1May2020
  27. Apr 30, 2020Cyber Security News for 30Apr2020
  28. Apr 29, 2020Cyber Security News for 29Apr2020
  29. Apr 28, 2020Cyber Security News for 28Apr2020
  30. Apr 27, 2020Cyber Security News for 27Apr2020
  31. Apr 24, 2020Cyber Security News for 24Apr2020
  32. Apr 23, 2020Cyber Security News for 23Apr2020
  33. Apr 22, 2020Cyber Security News for 22Apr2020
  34. Apr 21, 2020Cyber Security News for 21Apr2020
  35. Apr 20, 2020Cyber Security News for 20Apr2020
  36. Apr 19, 2020COVID-19: Considerations for implementing a remote work program
  37. Apr 18, 2020Cyber Security News for 18Apr2020
  38. Apr 17, 2020Cyber Security News for 17Apr2020
  39. Apr 16, 2020Cyber Security News for 16Apr2020
  40. Apr 15, 2020Cyber Security News for 15Apr2020
  41. Apr 14, 2020Cyber Security News for 14Apr2020
  42. Apr 13, 2020Cyber Security News for 13Apr2020
  43. Apr 12, 2020Google Apple Partnership to track Corona Virus infections
  44. Apr 11, 2020Cyber Security News for 11Apr2020
  45. Apr 10, 2020Cyber Security News for 10Apr2020
  46. Apr 9, 2020Cyber Security News for 9Apr2020
  47. Apr 8, 2020Cyber Security News for 8Apr2020
  48. Apr 7, 2020Cyber Security News for 7Apr2020
  49. Apr 6, 2020Cyber Security News for 6Apr2020
  50. Apr 5, 2020Cyber Security News for 5Apr2020
  51. Apr 4, 2020Cyber Security News for 4Apr2020
  52. Apr 3, 2020Cyber Security News for 3Apr2020
  53. Apr 2, 2020Cyber Security News for 2Apr2020
  54. Apr 1, 2020Cyber Security News for 1Apr2020
  55. Mar 31, 2020Cyber Security News for 31Mar2020
  56. Mar 30, 2020Cyber Security News for 30March2020
  57. Mar 29, 2020Cyber Security news of note for 29Mar2020
  58. Jan 25, 2020Coronavirus & Business Continuity Planning
  59. Jan 19, 2020What do your mobile devices know about you?
  60. Oct 26, 2019ISO Standards as they relate to Information Security
  61. Sep 14, 2019Security Products need regulation?
  62. Jan 9, 2019Is your data really yours?
  63. Dec 18, 2018Red Team vs Blue Team
  64. Dec 4, 2018Introduction to Zero Knowledge Proofs-Infographic
  65. Jul 28, 2018How to evaluate an ICO?
  66. May 27, 2018Lightning, Plasma, Raiden, and State Channels
  67. May 20, 2018Smart Cities, AI, Blockchain, and Hedera
  68. May 13, 2018Brief Introduction To Self-Sovereign Identity
  69. May 6, 2018GDPR Impacts On Service Providers
  70. Apr 28, 2018SOC2 Audit Planning
  71. Apr 22, 2018Blockchain Security Tools
  72. Apr 15, 2018What is a stable coin?
  73. Apr 7, 2018Blockchain Security
  74. Apr 1, 2018Privacy By Design
  75. Mar 30, 2018What is GDPR?
  76. Mar 18, 2018Cryptocurrency Anonymity, Privacy, & Fungibility
  77. Mar 11, 2018What are Privacy Coins
  78. Feb 9, 2018What to do after the Audit report has been issued?
  79. Feb 2, 2018SOC2 Reporting & Management Response
  80. Sep 16, 2017Analysis of Equifax communication on 15th September, 2017
  81. Sep 9, 2017What is an ICO?
  82. Aug 26, 2017Buying IOTA Tokens
  83. Jun 4, 2017Android Pay has finally arrived in Canada
  84. May 18, 2017Google IO 2017 Sundar Pichai keynote highlights
  85. May 16, 2017Bell Security Alert
  86. Mar 25, 2017Did you know Windows10 has a key logger?
  87. Jan 8, 2017Protect your privacy by moving to the dark web
  88. Nov 11, 2016Philips Hue Smart Lightbulbs Hack Can Spread IoT Worm Like Wildfire
  89. Oct 15, 2016Intelligent Personal Assistants, Amazon Echo, Google Assistant
  90. Sep 8, 2016Book Review-Never Eat Alone by Keith Ferrazzi
  91. Sep 8, 2016Flash before your eyes: Hacking technology for law enforcement revealed — RT America
  92. Sep 7, 2016Emirati civil rights activist targeted by advanced spyware hack
  93. Sep 7, 2016Naked Security: Hackers “find Twitter exploit” and resurrect banned accounts
  94. Sep 6, 2016The Register: Sundown exploit kit authors champions of copy-paste hacking
  95. Sep 6, 2016Forbes Now: Just One Photo Can Silently Hack Millions Of Androids
  96. Aug 2, 2016Daily Mail: Hacker claims 200m Yahoo accounts are listed on a dark web market
  97. Jul 3, 2016UNIX Auditing Script
  98. Jul 2, 2016Replace Tab with Space
  99. Jul 1, 2016Virtualization 101
  100. Jun 9, 2016Article: Password Manager KeePass Easily Used By Hackers
  101. May 20, 2016After LinkedIn Passwords Leak, Hackers Hijack Big Name Accounts | Motherboard
  102. May 19, 2016The Wall Street Journal.: Wealth Adviser Daily Briefing: Raymond James Fined $17 Million for Anti-Money-Laundering Lapses
  103. May 19, 2016Engadget: Millions of LinkedIn passwords stolen in 2012 surface online
  104. May 2, 2016Craig Wright = Satoshi Nakamoto
  105. Apr 19, 2016SS7 hack explained: what can you do about it? | Technology | The Guardian
  106. Apr 14, 2016Canadian police used BlackBerry’s key to unlock BBM messages
  107. Apr 11, 2016Self-spreading ransomware next computer threat, Cisco Systems says – Kitchener-Waterloo – CBC News
  108. Apr 10, 2016Criminal hackers now target hospitals, police stations and schools | Star Tribune
  109. Apr 10, 2016Attack on Philippines Election Commission Might Be The Largest Data Breach Ever
  110. Mar 26, 2016What is CyberSecurity?
  111. Mar 20, 2016In 10 Years 40% Of Purchases Will Use Voice Commerce With Voice Payments. Ontological Recipes Will Be The Driving Technology.
  112. Mar 15, 2016Security News This Week: WhatsApp Is Caught in Its Own Crypto War in Brazil
  113. Mar 15, 2016Forcing Apple to Hack That iPhone Sets a Dangerous Precedent
  114. Mar 15, 2016Bangladesh bank governor resigns after $81m hack – AJE News
  115. Mar 15, 20166 Big Hack Attacks Targeting Financial Data: 2016
  116. Mar 13, 2016An inkjet printer can fool your smartphone with fake fingerprints
  117. Feb 28, 2016Tor Project says Google, CloudFlare and others are involved in dark web surveillance and disruption | BetaNews
  118. Feb 27, 2016Veil Framework – Antivirus Evasion Framework – Darknet – The Darkside
  119. Feb 27, 2016How This Company Makes $70 Million Selling Random Stuff on Amazon | Inc.com
  120. Feb 27, 2016Moxie Marlinspike >> Blog >> We Should All Have Something To Hide
  121. Feb 25, 2016Celebrity nude photo hacker pleads guilty – Naked Security
  122. Feb 20, 2016How Just Opening an MS Word Doc Can Hijack Every File On Your System
  123. Feb 20, 2016Sophos says: #nobackdoors! – Naked Security
  124. Feb 20, 2016Senator drafting bill to criminalize Apple’s refusal to aid decryption [Updated] | Ars Technica
  125. Feb 18, 2016How Apple will fight the DOJ in iPhone backdoor crypto case | Ars Technica
  126. Feb 15, 2016This Android Malware Can Root Your Device And Erase Everything
  127. Feb 13, 2016Here’s How to Decrypt Hydracrypt & Umbrecrypt Ransomware Files
  128. Feb 9, 2016UK-US deal would allow MI5 to get chat, e-mails directly from US companies
  129. Feb 9, 2016France Orders Facebook To Stop Tracking Non-Users or Face Fines
  130. Feb 9, 2016Manulife seeks to trade health data for insurance premium discounts Add to …
  131. Feb 9, 2016Here’s the Facebook Hacking Tool that Can Really Hack Accounts, But…
  132. Feb 9, 2016Clever bank hack allowed crooks to make unlimited ATM withdrawals
  133. Feb 9, 2016Skimmers Hijack ATM Network Cables
  134. Feb 8, 2016Hacker says he’s breached DHS and FBI, leaks claimed staff data – Naked Security
  135. Feb 8, 2016Google says “No more” to deceptive download and play buttons in ads – Naked Security
  136. Feb 8, 2016IoT Reality: Smart Devices, Dumb Defaults — Krebs on Security
  137. Feb 8, 2016YARA – Pattern Matching Tool For Malware Analysis – Darknet – The Darkside
  138. Feb 8, 2016Oracle Issues Emergency Java Update for Windows
  139. Feb 7, 2016Top cybercrime ring disrupted as authorities raid Moscow offices
  140. Feb 7, 20165 Small Changes That Will Make You a Much Better Communicator | Inc.com
  141. Feb 7, 2016Github exposes your personal email address – Taylor Hakes
  142. Feb 7, 2016It’s Open Season On Employees’ Health Data
  143. Feb 7, 2016SSH: Best practices at Aris’ Blog – Computers, ssh and rock’n roll
  144. Feb 7, 20163 Ways That The Blockchain Will Change The Real Estate Market | TechCrunch
  145. Feb 6, 2016U.S., Britain consider letting spy agencies, police seek email, chat data from companies
  146. Feb 6, 2016Disney World-area University admits massive data breach
  147. Feb 6, 2016MIT Develops Hack-Proof RFID Chip — Here’s How It Works
  148. Feb 6, 2016The Pirate Bay now uses Torrents Time to let you stream all its movies and TV shows
  149. Feb 6, 2016iOS flaw lets hackers thwart lock screen passcode on iPhones and iPads
  150. Feb 6, 2016Gophish – Open-Source Phishing Framework – Darknet – The Darkside
  151. Feb 6, 2016This Hacker Uncovered A Massive Police Surveillance Dragnet While Serving Time In Prison
  152. Feb 6, 2016UC Berkeley profs blast secret IT monitoring kit on campus
  153. Feb 4, 2016Maryland Attorney General: If You Don’t Want To Be Tracked, Turn Off Your Phone
  154. Feb 4, 2016Google engineer finds holes in three ‘secure’ browsers
  155. Feb 4, 2016Warning — Popular ‘Hot Patching’ Technique Puts iOS Users At Risk
  156. Feb 4, 2016Cybersecurity gap blocks Pentagon from a Lockheed F-35 database
  157. Feb 4, 2016WordPress under attack by whack-a-mole ad-scam malware
  158. Feb 4, 2016Hackers targeted 20 million Alibaba customer accounts
  159. Feb 4, 2016OpenSSL fixes bug, gets dissed by German gov: That’s so random … not
  160. Feb 4, 2016Mysterious spike in WordPress hacks silently delivers ransomware to visitors
  161. Feb 2, 2016123456 Still The Most Common Password For 2015
  162. Feb 2, 2016eBay refuses to fix flaw exposing users to malware and phishing attacks
  163. Feb 2, 2016NASA HACKED! AnonSec tried to Crash $222 Million Drone into Pacific Ocean
  164. Feb 2, 2016Google fixes critical Wi-Fi and media-processing flaws in Android
  165. Jan 30, 2016Best Hacking Tools Of 2016 For Windows, Mac OS X, And Linux – fossBytes
  166. Jan 30, 2016NSA Top Hacker: Here’s How to Make My Life Hard
  167. Jan 29, 2016Hackers release data from Fraternal Order of Police, largest U.S. police union
  168. Jan 29, 2016Courts affirm FBI use of mass-hacking tool to find child-porn suspects – The Washington Post
  169. Jan 29, 2016Survey: Consumers reject companies that don’t protect privacy
  170. Jan 29, 2016In demand cyber security pros to see salaries soar in 2016 – Computer Business Review
  171. Jan 18, 2016LastPass in 2FA lock down after ‘fessing up to phishing attack • The Register
  172. Jan 18, 2016The best Hacking tools of 2016 for hackers and pentesters » TechWorm
  173. Jan 18, 2016There is no ‘compromise’ in encryption debate between Silicon Valley and government leaders
  174. Jan 17, 2016European Antitrust Chief Takes Swipe at Privacy Issue – NYTimes.com
  175. Jan 17, 2016The easy guide on how to access the Dark Web using Tor » TechWorm
  176. Jan 15, 2016Encryption Guru David Chaum Defends Controversial Crypto Plan – Fortune
  177. Jan 13, 2016New York state considers bill mandating backdoors in smartphone encryption
  178. Jan 12, 2016Online Security: It’s Time to Upgrade Your Passwords – ABC News
  179. Jan 12, 2016Privacy watchdog attacks snooper’s charter over encryption | Technology | The Guardian
  180. Jan 12, 2016Et tu, Fortinet? Hard-coded password raises new backdoor eavesdropping fears | Ars Technica
  181. Jan 12, 2016French government considers law that would outlaw strong encryption
  182. Jan 12, 2016Beware: Google Chrome incognito porn searches exposed by Nvidia GPU driver bug
  183. Jan 12, 2016The five big lies of the encryption debate | The Verge
  184. Jan 12, 2016Antivirus software leaves users wide open to attack
  185. Jan 10, 2016Two months after FBI debacle, Tor Project still can’t get an answer from CMU | Ars Technica
  186. Jan 10, 2016Tech executives ‘open’ to helping Obama thwart ISIS, Apple holds strong on encryption | The Verge
  187. Jan 9, 2016Juniper to scrap code that granted NSA backdoor access
  188. Jan 8, 2016Unlike Mozilla, Google anticipated SHA-1 errors caused by HTTPS traffic inspection systems | CSO Online
  189. Jan 8, 2016ProPublica launches world’s first major news site for dark web | Media | The Guardian
  190. Jan 8, 2016PCI Standards Security Council extends the SSL/TLS migration date to June 2018
  191. Jan 8, 2016Tor is the web browser you should be using if you care at all about security
  192. Jan 7, 2016Microsoft may have your encryption key; here’s how to take it back
  193. Jan 7, 2016$5,000 Malware Allows Anyone To Empty ATMs — But It Isn’t Worth The Trouble – Forbes
  194. Jan 7, 2016CES 2016 security and privacy tech: hacker-proof gadgets
  195. Jan 6, 2016Fatally weak MD5 function torpedoes crypto protections in HTTPS and IPSEC | Ars Technica
  196. Jan 5, 2016Comcast security flaw could help burglars break into homes undetected | Ars Technica
  197. Jan 5, 2016NSA Targeted ‘The Two Leading’ Encryption Chips – Slashdot
  198. Jan 5, 2016The FBI’s ‘Unprecedented’ Hacking Campaign Targeted Over a Thousand Computers | Motherboard
  199. Jan 2, 2016Group says BBC website hack was a test for attack on ISIS
  200. Dec 30, 2015Take control of your data on Facebook
  201. Dec 30, 2015Anonymity network will pay hackers who find flaws
  202. Dec 30, 2015Privacy Violations Rising At Veterans Affairs Medical Facilities
  203. Dec 30, 2015AVG’s Web TuneUp put millions of Chrome users at risk
  204. Dec 30, 2015Samsung is securing its smart TVs before they control your house
  205. Dec 29, 2015China’s Anti-Terrorism Law Could Mean Trouble For Apple Encryption, US Tech Companies
  206. Dec 29, 2015Privacy-as-a-Service Scatters Data in Disappearing Clouds
  207. Dec 29, 2015iBlue Immobilizer Smart Car Security Prevents Your Vehicle from Thieves
  208. Dec 29, 2015Common payment processing protocols found to be full of flaws
  209. Dec 29, 2015Researchers have developed a new password system that uses emoji
  210. Dec 29, 2015Microsoft is storing users’ sensitive encryption keys in the cloud
  211. Dec 29, 20152016 Reality: Lazy Authentication Still the Norm
  212. Dec 28, 2015New China Anti-Terrorism Law Confuses the ? out of U.S. Tech Companies
  213. Dec 28, 2015Data on 191 Million U.S. Voters Was Leaked Online, Says Security Researcher
  214. Dec 28, 2015Residents In Nine States Could Need A Second Form Of ID To Pass Through Airport Security Next Year – Consumerist
  215. Dec 28, 20158 Disastrous Outsourcing Mistakes You Need to Avoid | Inc.com
  216. Dec 28, 2015The Single Leadership Trait That Adds the Most Value to Companies | Inc.com
  217. Dec 28, 2015Comcast activates first DOCSIS 3.1 modem
  218. Dec 28, 2015China says sweeping new snooping laws match UK and US
  219. Dec 27, 2015Anonymous takes credit for cyberattacks crippling Turkey
  220. Dec 25, 2015The Life-Changing Magic Of Tidying Up: Mind-Hacking Advice For Living Clutter Free | Lifehacker Australia
  221. Dec 25, 2015Someone wants infect millions of Raspberry Pi computers
  222. Dec 24, 2015100 Best Open Source Security Tools
  223. Dec 24, 2015Your Favorite HBR Articles of 2015
  224. Dec 24, 2015The browser with 300 million users that’s breaking your site
  225. Dec 24, 20155 Android Productivity Apps to Help You in 2016
  226. Dec 23, 2015Researchers Say The Juniper Hack Could Be The Work Of Government–But Which One?
  227. Dec 23, 2015Iranian Hackers Claim Cyber Attack on New York Dam
  228. Dec 23, 2015This $200 DIY WiFi router will make it far easier for whistleblowers (and criminals) to hide online
  229. Dec 22, 2015Google Is Gearing Up To Kill Your Email Password
  230. Dec 22, 2015How To Turn Your Old Smartphone Into A Smart Mirror | Popular Science
  231. Dec 22, 2015Wearing a smartwatch could give hackers your PIN
  232. Dec 22, 2015Over a Quarter of the Encrypted Web Is About to Be Broken
  233. Dec 22, 2015What’s All the Fuss About Evernote? Should I Be Using It?
  234. Dec 22, 2015What’s All the Fuss About Evernote? Should I Be Using It?
  235. Dec 21, 2015Researchers confirm backdoor password in Juniper firewall code
  236. Dec 21, 2015Iranian hackers breached New York dam causing White House alarm
  237. Dec 21, 2015AP Investigation: US power grid vulnerable to foreign hacks
  238. Dec 21, 2015Database leak exposes 3.3 million Hello Kitty fans – security website
  239. Dec 21, 2015The FTC says Oracle ‘deceived consumers’ and left software on 850 million PCs vulnerable to hackers
  240. Dec 20, 2015Why a 23-month-old UK cyber security startup is worth more than $100 million
  241. Dec 20, 2015Over 650 terabytes of MongoDB data exposed on Internet
  242. Dec 19, 2015Contactless payments mean card fraud now happens after cancellation
  243. Dec 19, 2015Here are the devices law enforcement use to spy on you
  244. Dec 19, 2015Read This Google Email About Time Management Strategy
  245. Dec 19, 201530 Books to Help Further Your Career | TIME
  246. Dec 19, 2015Need a secure smartphone? Answer is simple, experts say
  247. Dec 18, 2015The U.S. Justice Department is looking into the big data breach at Uber
  248. Dec 18, 2015Instagram Security Flaws Lead To War Of Words Between Facebook and Hacker
  249. Dec 18, 2015LifeLock to Pay $100 Million to Consumers to Settle FTC Charges it Violated 2010 Order
  250. Dec 18, 2015What we learned about SSDs in 2015 | ZDNet
  251. Dec 18, 2015Juniper Issues Emergency Advisory After Rogue Backdoor Code Discovered
  252. Dec 18, 201545 Free Online Classes You Can Take to Improve Your Career – The Muse
  253. Dec 17, 2015Are Isis hackers trying to destroy the internet?
  254. Dec 17, 2015Pentagon chief used personal email account for some official business
  255. Dec 16, 2015Did Polish cryptographers crack the Nazi Enigma code before Alan Turing?
  256. Dec 15, 2015The Online Habits That Trigger NSA Spying
  257. Dec 15, 2015Police Arrest Man In Hack of 6.4 Million Kids’ Toys | TIME
  258. Dec 14, 2015MacKeeper Leaks 13 Million Mac Owners’ Data, Leaves Passwords Open To Easy Cracking
  259. Dec 14, 2015Researchers hide messages in a sea of spam
  260. Dec 14, 2015100 Podcasts that will make you wiser
  261. Dec 13, 2015The 14 scariest hacks of 2015
  262. Dec 13, 2015Cyber Espionage Is Reaching Crisis Levels
  263. Dec 12, 2015Top ten operating systems for ethical hackers and security researchers
  264. Dec 11, 2015Legal hacking gadgets for sale online
  265. Dec 11, 2015The hidden risks of bringing the Internet of Things into your home
  266. Dec 11, 201577,000 Steam accounts are hacked and raided every month
  267. Dec 11, 2015When kids start getting hacked, it’s time to wake up about cybersecurity
  268. Dec 11, 2015iOS and Mac attacks will rise in 2016, but Apple still No. 1 for security
  269. Dec 11, 2015Facebook security warning over expiring algorithm
  270. Dec 11, 2015MIT Develops Secure SMS System, Even More Anonymous Than Tor
  271. Dec 10, 2015Costs And Risks Of UK’s Draft Surveillance Powers Probed
  272. Dec 10, 2015Encryption and Other Tricks Are Making Malvertising Harder to Hunt
  273. Dec 9, 2015A hacker cartel is using a mysterious Flash vulnerability to steal sensitive business data
  274. Dec 9, 2015I Bought Adorable Cookies on the Deep Web
  275. Dec 9, 2015The FBI director just gave a striking example of how much of a problem encryption has become
  276. Dec 9, 20155 science-backed habits that lead to long-term happiness
  277. Dec 8, 2015Getting a Linux box corralled into a DDoS botnet is easier than many think | Ars Technica
  278. Dec 8, 2015Wired and Gizmodo both claim to have possibly found the creator of Bitcoin | Ars Technica
  279. Dec 8, 2015Soon, every Audi, BMW, and Mercedes could be a digital mapper – SlashGear
  280. Dec 8, 2015Another Huge Security Hole Has Been Discovered on Lenovo Computers
  281. Dec 8, 2015Are You a Manager or a Leader? Here’s How to Tell the Difference.
  282. Dec 8, 2015Universities across the country lose internet connections following cyber attack
  283. Dec 8, 2015The Secret Is The Beginning
  284. Dec 7, 2015Russian Cyberspies Use Updated Arsenal to Attack Defense Contractors
  285. Dec 7, 2015Boston Police Confirm They’re Using Cell Phone Trackers
  286. Dec 7, 2015ZeroDB, an end-to-end encrypted database, is open source!
  287. Dec 7, 2015Priv security update patches sixteen holes for safety’s sake
  288. Dec 7, 2015Vtech breach: Passwords ‘not securely stored’
  289. Dec 7, 2015France looking at banning Tor, blocking public Wi-Fi
  290. Dec 7, 2015Vulnerabilities in industrial gas detectors require little skill to exploit
  291. Dec 7, 2015These 5 companies will dominate driverless cars
  292. Dec 6, 2015Proposed French Law Would Ban TOR In Response to Terror Attacks
  293. Dec 6, 2015Microsoft to open source Chakra JavaScript engine | PCWorld
  294. Dec 6, 2015Waldo – Multithreaded Directory and Subdomain Bruteforcer
  295. Dec 6, 2015Swift goes Open Source
  296. Dec 6, 2015Work Less and Do More by Applying the Pareto Principle to Your Task List
  297. Dec 6, 2015This App Can Scan and Solve Math Equations Instantly | TIME
  298. Dec 5, 2015Google Cloud Security Scanner reaches General Availability
  299. Dec 5, 2015The Seriously Wacky Way Cosmologists Say We Could Encrypt Data
  300. Dec 5, 2015This is BIG! All Govt. Transactions Above Rs 1000 May Be Now Cashless By Law
  301. Dec 5, 2015New software watches for license plates, turning you into Little Brother
  302. Dec 5, 2015These hackers prefer a different approach: asking the victims to further spread their malware
  303. Dec 5, 2015Dark Web 101: Shedding some light into the darkness
  304. Dec 5, 2015New Analysis: The Most Hackable Programming Language Is Hands-Down PHP
  305. Dec 4, 2015Snowden-endorsed encrypted messaging app Signal comes to your browser
  306. Dec 4, 2015Credit card details safe but personal info swiped in JD Wetherspoon breach
  307. Dec 4, 2015Hacker Holds United Arab Emirates Bank to Ransom, Demands $3 Million
  308. Dec 4, 2015Kazakhstan makes it mandatory for citizens to install internet backdoors
  309. Dec 4, 2015A deadly campaign delivers Pony info-stealer followed by Cryptowall ransomware
  310. Dec 3, 2015Anonymous Leaks Paris Climate Summit Officials’ Private Data
  311. Dec 3, 2015Free digital certificate project opens doors for public beta
  312. Dec 3, 2015Ponmocup Botnet Still Actively Used for Financial Gain
  313. Dec 3, 2015The Programming Languages That Spawn The Most Software Vulnerabilities
  314. Dec 3, 2015Facebook Must Stop Sending Personal Data From Europe To The U.S., Says Activist
  315. Dec 3, 2015China says criminals were behind massive US federal data breach
  316. Dec 2, 2015How the Dark Web’s favorite anonymity tool got hacked
  317. Dec 2, 2015After privacy ruling, Facebook now requires Belgium users to log in to view pages
  318. Dec 2, 2015Encrypted messaging app Signal available for desktops
  319. Dec 1, 2015Buy Kids iPhones And Kill Connected Toys — Hacker Advice To Parents After Awful VTech Breach
  320. Dec 1, 2015Hacked Toymaker VTech Admits Breach Actually Hit 6.3 Million Children
  321. Nov 30, 2015Protect your messages with M – Safe email made simple
  322. Nov 30, 2015Nine percent of HTTPS hosts on the web “share the same private keys”
  323. Nov 30, 2015What is Encryption, and Why Are People Afraid of It?
  324. Nov 30, 2015CNP Mobile: News
  325. Nov 29, 2015Inside the VTech hack that jeopardized data of more than 200,000 kids
  326. Nov 29, 2015
  327. Nov 28, 2015How to Negotiate with Someone More Powerful than You
  328. Nov 28, 2015EU wants to give national privacy regulators more clout in new U.S. data pact
  329. Nov 27, 2015Most Complex Cash Register Malware Ever Is Out to Steal Your Money and ID
  330. Nov 27, 2015Deloitte launches Australian Cyber Intelligence Centre
  331. Nov 27, 2015LG Officially Announces LG Pay Mobile Payments
  332. Nov 27, 2015Microsoft kills dodgy security certificates
  333. Nov 26, 2015Facebook tops Google’s list for ‘right to be forgotten’ requests |
  334. Nov 26, 2015Don’t be a turkey! How to stay cybersecure this holiday season
  335. Nov 26, 2015?U.S. Government data shows Windows 10 usage climbing as Windows 7 share drops sharply
  336. Nov 26, 2015600,000 cable routers found to have a backdoor within a backdoor
  337. Nov 25, 2015Node.js discloses two critical security vulnerabilities
  338. Nov 25, 2015Google’s New Gmail Security Feature
  339. Nov 25, 2015Lazy IoT, router makers reuse skeleton keys over and over in thousands of devices – new study
  340. Nov 25, 2015Even If Terrorists Do Use Strong Encryption, We Still Need It — Backchannel — Medium
  341. Nov 25, 2015Popular Facebook Quiz Compromises Security Of 16 Million People Who Have Taken It
  342. Nov 24, 2015N.C. man sentenced for running site that pirated $6M worth of music
  343. Nov 24, 2015Amazon Resets Account Passwords After Possible Password Leak
  344. Nov 24, 2015Dell computers bundled with backdoor that blurts hardware fingerprint to websites
  345. Nov 24, 2015Use of Credit Card ‘Skimmers’ at Gas Stations, ATMs Is Exploding
  346. Nov 24, 2015Hilton Acknowledges Credit Card Breach
  347. Nov 23, 20159 Things You MUST Do When a Key Employee Leaves | Inc.com
  348. Nov 23, 2015Want to defend your network? Profile the person attacking it • The Register
  349. Nov 23, 2015Algebraic Eraser, the algorithm running the ‘Internet of Things’ is broken…again
  350. Nov 22, 2015Google can remotely bypass the passcode of at least 74% of Android devices if ordered
  351. Nov 22, 2015Aircrack-ng 1.2 RC3
  352. Nov 22, 2015Homeland Security chair: ‘Biggest threat today’ is terrorists using encryption
  353. Nov 22, 2015Many embedded devices ship without adequate security tests, analysis shows
  354. Nov 22, 2015Here’s How Facebook M’s Artificial Intelligence Works
  355. Nov 21, 2015Ransomware Is Coming to Medical Devices
  356. Nov 21, 2015Patreon hack victims are being ordered to pay a ransom to save their data
  357. Nov 21, 2015Customers at Sheraton, Westin, other hotels hit by data-stealing hack attack
  358. Nov 21, 2015MIT Launches First Graduate Fintech Course
  359. Nov 21, 201510 Things You Should Know About Blockchains
  360. Nov 21, 2015TrueCrypt Safer Than Previously Thought
  361. Nov 21, 2015MIT Launches First Graduate Fintech Course | Payment Week
  362. Nov 20, 2015Who’s running dozens of top-secret unpatched databases? The Dept of Homeland Security
  363. Nov 20, 2015It’s official—NSA did keep its e-mail metadata program after it “ended” in 2011
  364. Nov 20, 2015Encryption is here to stay
  365. Nov 20, 2015Russian Cybergangs Stole Some $790 Million Over 3 Years
  366. Nov 20, 2015As Encryption Debate Gets Fiercer, Silicon Valley And D.C. Collide
  367. Nov 19, 2015Homeland Security Running Hundreds of Sensitive, Top Secret Databases Vulnerable to Attacks
  368. Nov 19, 2015Why The Java Deserialization Bug Is A Big Deal
  369. Nov 19, 2015Super Cookies, Web Analytics Behind Malicious Profiling
  370. Nov 19, 2015Strontium hacking team targets NATO members, political advisors
  371. Nov 19, 2015US-China Security Review Commission Discusses ‘Hack-Back’ Laws
  372. Nov 18, 2015Paris attacks re-ignite debate over NSA tactics, metadata program
  373. Nov 18, 2015This company’s name isn’t a joke: Secret Double Octopus goes beyond encryption
  374. Nov 18, 2015Siri?s Lockscreen Bypass A Growing Privacy Issue For iOS Users
  375. Nov 18, 2015U.S. may be financing encryption apps to stay ahead of terrorists
  376. Nov 18, 2015After Endless Demonization Of Encryption, Police Find Paris Attackers Coordinated Via Unencrypted SMS
  377. Nov 18, 2015Google-owned VirusTotal starts analyzing Mac malware in a sandbox
  378. Nov 18, 2015Manhattan DA calls for backdoors in all mobile operating systems
  379. Nov 17, 2015Blast from the Past: Blackhole Exploit Kit Resurfaces in Live Attacks
  380. Nov 17, 2015Metadata Surveillance Didn’t Stop the Paris Attacks
  381. Nov 17, 2015Paris Terror Attacks Stoke Encryption Debate
  382. Nov 17, 2015Cyber Crew — “How To Build A Portable Hacking Station With A…
  383. Nov 17, 2015Researchers discover morphed RATs capable of DDOS, phone log manipulation
  384. Nov 16, 2015After Paris Attacks, Here’s What the CIA Director Gets Wrong About Encryption
  385. Nov 16, 2015ISP (Quietly) Acknowledges That BitTorrent Doesn’t Equal Piracy
  386. Nov 16, 2015Don’t fast-track the new surveillance bill: it needs considered scrutiny
  387. Nov 16, 2015FBI denies paying $1 million to unmask Tor users
  388. Nov 14, 2015Belgium’s home affairs minister says ISIL communicates using Playstation 4
  389. Nov 14, 2015New Android Exploit Can Hack Your Phone From a Website
  390. Nov 14, 2015MetroPCS customer info made vulnerable to hackers by website security flaw
  391. Nov 12, 2015Man-in-the-middle attack on Vizio TVs coughs up owners’ viewing habits
  392. Nov 12, 2015Tor director: FBI paid Carnegie Mellon $1M to break Tor, hand over IPs
  393. Nov 10, 2015Belgian court orders Facebook to stop tracking non-members
  394. Nov 10, 2015First Linux ransomware program cracked, for now
  395. Nov 10, 2015Tim Cook says UK plans to weaken encryption will ‘hurt good people’
  396. Nov 9, 2015‘Secret Sister’ gift exchange is a scam
  397. Nov 9, 2015NSA discloses 91% of found bugs but doesn’t say when it discloses them
  398. Nov 9, 2015EMC, Hospital to Pay $90,000 Over Data Theft From Stolen Laptop
  399. Nov 6, 2015Newly Discovered Breed of Android Malware Is Almost Impossible to Remove
  400. Nov 5, 2015Anonymity Isn’t a Bug – It’s a Feature
  401. Nov 5, 2015Booming crypto ransomware industry employs new tricks to befuddle victims
  402. Nov 4, 2015Slashdot
  403. Nov 2, 2015Hackers claim $1 million bounty after remotely jailbreaking iPhones
  404. Nov 2, 2015Vulnerability Management
  405. Nov 2, 2015How do you anonymize personal databases and protect people’s privacy – over to you, NIST
  406. Nov 2, 2015Hackers use anti-adblocking service to deliver nasty malware attack
  407. Nov 2, 2015Newly Discovered Exploit Makes Every iPhone Remotely Hackable
  408. Nov 1, 2015There have been more malware attacks on Macs this year than the last five years combined
  409. Nov 1, 2015Filling the cybersecurity talent pipeline
  410. Oct 31, 2015National U.S. Privacy Laws Are Needed
  411. Oct 29, 2015Hackers, Activists, Journos: How to Build a Secure Burner Laptop
  412. Oct 29, 2015CryptoWall 3.0 traffic analysis
  413. Oct 29, 2015Still fuming over HTTPS mishap, Google makes Symantec an offer it can’t refuse
  414. Oct 28, 2015
  415. Oct 28, 2015Schools warned about using Dropbox after Safe Harbour ruling
  416. Oct 27, 2015Judge says Obama administration asking Apple to skip passwords is ‘lethal’
  417. Oct 27, 2015Senate passes controversial cybersecurity-cyberspying bill 74-21
  418. Oct 27, 2015Download and Install The Most Secure Linux Based OS Ever [Full Tutorial]
  419. Oct 26, 2015Top German official infected by highly advanced spy trojan with NSA ties
  420. Oct 26, 2015TrueCrypt Travails Continue
  421. Oct 24, 2015BlackBerry reveals the lengths it went to make Android ‘secure’
  422. Oct 24, 2015Microsoft Runs the Largest Botnets to Protect Azure Customers
  423. Oct 24, 2015DoJ to Apple: your software is licensed, not sold, so we can force you to decrypt
  424. Oct 24, 2015TalkTalk hush-hush on compo for up to 4 million customers after mega cyber attack
  425. Oct 23, 2015Europe’s top privacy watchdog calls on firms to curb U.S. data transfers
  426. Oct 23, 2015Apple’s EULA Gives It License to Invade Your Privacy, Government Claims
  427. Oct 23, 2015TalkTalk hacking crisis deepens as more details emerge
  428. Oct 23, 2015Joomla bug puts millions of websites at risk of remote takeover hacks
  429. Oct 23, 2015NSA’s Divorce from ECC Causing Crypto Hand-Wringing
  430. Oct 23, 2015Botnets running on CCTVs and NASs
  431. Oct 23, 2015How AmEx is ‘Testing the Waters’ of Bitcoin and the Blockchain
  432. Oct 22, 2015Full-Disk Encryption Is Mandatory on Android 6.0—If the Device Can Cope
  433. Oct 21, 2015Foundation of ‘dark Web’ steps into the light
  434. Oct 21, 2015Hackers Can Wirelessly Upload Malware to a Fitbit in 10 Seconds
  435. Oct 21, 2015New attacks on Network Time Protocol can defeat HTTPS and create chaos
  436. Oct 18, 2015OS X El Capitan License: in Plain English
  437. Oct 17, 2015Android malware apps might net hackers millions, fool Google Play Store security
  438. Oct 17, 2015The ISIL is trying to hack American electrical power companies
  439. Oct 17, 2015Security flaw makes every Android device on AT&T and Verizon’s wireless vulnerable
  440. Oct 9, 2015Submission: The first successful collision attack on the SHA-1 hashing algorithm
  441. Oct 9, 2015FBI takes down alert on chip credit cards after bankers complain
  442. Oct 9, 2015White House won’t ask for encryption backdoor law – may seek ‘back window’ later
  443. Oct 8, 2015Edward Snowden: “Smartphones Can Be Easily Hacked With Just 1 Text Message”
  444. Oct 7, 2015WhatsApp flunks the EFF’s annual data privacy test while Apple and Dropbox ace it
  445. Oct 6, 2015Europe Delivers Blow To Tech Companies, By Ruling Against Data Transfer
  446. Oct 5, 2015This graphic shows all the ways your car can be hacked
  447. Oct 5, 2015Automatic Face Recognition and Surveillance
  448. Oct 3, 2015Data likely stolen from Experian/T-Mobile spotted for sale on dark web, says Trustev
  449. Oct 1, 2015T-Mobile customers exposed in major Experian data breach
  450. Oct 1, 2015WinRAR security flaw opens users to remote attack just by unzipping files
  451. Oct 1, 2015Patreon was hacked, personal data accessed
  452. Oct 1, 2015A single song could be used to exploit more than a billion Android phones
  453. Sep 30, 2015A New Botnet Hits Servers With 150 Gbps DDoS Attacks
  454. Sep 30, 2015McDonald’s now accepts ‘two-second’ mobile payments in China amid big data push
  455. Sep 30, 2015Are you still using TrueCrypt? Beware of these 2 critical flaws!
  456. Sep 30, 2015Companies leave vulnerabilities unpatched for up to 120 days
  457. Sep 28, 2015Microsoft reaffirms privacy commitment, but Windows will keep collecting data
  458. Sep 28, 2015This Might Be the Most Secure Android Phone You Can Buy, But It’ll Cost You
  459. Sep 26, 2015Forcing suspects to reveal phone passwords is unconstitutional, court says
  460. Sep 25, 2015From Radio to Porn, British Spies Track Web Users’ Online Identities
  461. Sep 24, 2015VIDEO: Fingerprints are not the same as passwords
  462. Sep 24, 2015FBI CISO warns of IoT data breaches
  463. Sep 24, 2015OPM says 5.6 million fingerprints stolen in cyberattack, five times as many as previously thought
  464. Sep 22, 2015XcodeGhost apps haunting iOS App Store more numerous than first reported
  465. Sep 22, 2015Apple’s App Store Got Infected With the Same Type of Malware the CIA Developed
  466. Sep 22, 2015Hack Brief: Mobile Manager’s Security Hole Would Let Hackers Wipe Phones
  467. Sep 22, 2015Most U.S. organizations cannot properly respond to a cyberattack
  468. Sep 22, 2015Android games packaged with trojan available on Google Play
  469. Sep 22, 2015Healthcare Biggest Offender In 10 Years Of Data Breaches
  470. Sep 20, 2015You can crash Google Chrome in 16 characters or less
  471. Sep 19, 2015What Snowden Never Told Us
  472. Sep 19, 2015Apple claims to have fully fixed a critical iOS Airdrop vulnerability, which researcher says it doesn’t
  473. Sep 18, 2015Australian security researcher uncovers serious iPhone flaw
  474. Sep 18, 2015Malicious SYNful Cisco router implant found on more devices around the globe
  475. Sep 13, 2015Nest thermostats and security cameras hit by second outage in a week [Update: fixed]
  476. Sep 9, 2015Apple is refusing Justice Department requests for iMessages
  477. Sep 9, 2015Security Researcher Brian Krebs Receives Legal Threat From Former Ashley Madison Exec Over Hacking Allegations
  478. Sep 9, 2015Outdated iOS Devices a Threat to Enterprise Networks
  479. Sep 9, 2015Blurred lines: Cyberespionage group caught borrowing banking malware code
  480. Sep 8, 2015Microsoft Confirms Purchase Of Cloud Security Firm Adallom
  481. Sep 8, 2015WhatsApp Issues Update for ‘MaliciousCard’ Vulnerabilities in Web-Based Extension
  482. Sep 8, 2015TLS Implementations Vulnerable to RSA Key Leaks
  483. Sep 8, 2015San Diego-based Agent of Change notifying students that personal and sensitive information accessed by hackers
  484. Sep 8, 2015Sofacy Recycles Carberp and Metasploit Code
  485. Sep 8, 2015Hundreds million legit websites could serve Ransomware because of Script Injection compromise
  486. Sep 7, 2015PayPal Mobile Apps Plagued by Authentication Flaw: Researcher
  487. Sep 7, 2015Stay alert Security Researchers as Fake Recruiters send you invitation on LinkedIn
  488. Sep 7, 2015PayPal Mobile Apps Plagued by Authentication Flaw: Researcher
  489. Sep 7, 2015Hackers Exploit Stolen Firefox Bug Information
  490. Sep 7, 2015Gcat – Python Backdoor Using Gmail For Command & Control
  491. Sep 7, 2015How the mysterious dark net is going mainstream
  492. Sep 3, 20159 baby monitors wide open to hacks that expose users’ most private moments
  493. Sep 3, 2015Large majority of device users put corporate information at risk
  494. Sep 3, 2015How a simple email error revealed the identities of hundreds of HIV patients
  495. Sep 3, 2015Black Hat survey reveals a disconnect between losses and security program focus
  496. Sep 3, 2015Google, Mozilla, Microsoft browsers will dump RC4 encryption
  497. Sep 2, 2015Creator of PGP doesn’t use PGP, spurs discussion
  498. Sep 2, 2015Florida Man Sentenced in Stolen Identity Tax Refund Fraud Scheme
  499. Aug 29, 2015PayPal fixes serious vulnerability in its domain
  500. Aug 24, 2015Samsung smart fridge exposes Gmail login details to attackers
  501. Aug 24, 2015FTC can sue companies with poor information security, appeals court says
  502. Aug 23, 2015Android lock patterns as predictable as common passwords
  503. Aug 8, 2015Wait, what? TrueCrypt ‘decrypted’ by FBI to nail doc-stealing sysadmin
  504. Aug 8, 2015A Hack That Turns The Square Card Reader Into A Credit Card Data Skimmer
  505. Aug 8, 2015Update your Firefox browser to fix the vulnerability
  506. Aug 7, 2015Hacking Team compromised non-jailbroken iOS devices
  507. Aug 5, 2015Security challenges emerging with the rise of the personal cloud
  508. Aug 1, 2015Former DOD Contractor/Sysadmin Sentenced for Accessing and Removing Classified Information from Military Computers
  509. Jul 30, 2015United Airlines reportedly hacked by same APT that breached OPM, Anthem
  510. Jul 30, 2015Russian Zero Day Hunter Has Android Stagefright Bugs Primed For One-Text Hacks
  511. Jul 30, 2015Commercial code is more compliant to security standards than open source code
  512. Jul 30, 2015Google Cloud features BYO encryption keys
  513. Jul 26, 2015BlackBerry doubles down on security and privacy
  514. Jul 26, 2015Steam Hit by Major Security Breach, Many Accounts Hacked
  515. Jul 26, 2015How to send encrypted emails
  516. Jul 26, 2015Security holes in the 3 most popular smart home hubs and Honeywell Tuxedo Touch
  517. Jul 24, 2015Anonymous says it hacked Canada’s security secrets in retaliation for police shooting of B.C. activist
  518. Jul 23, 2015Pakistani Intelligence Sought Huge Data Collection Tools: Report
  519. Jul 21, 2015Encrypted Web and Wi-Fi at risk as RC4 attacks become more practical
  520. Jul 21, 2015Lifelock Once Again Failed at Its One Job: Protecting Data
  521. Jul 21, 2015Hackers Hijacked A Jeep With A Reporter Inside, And 5 Other Scary Hacks
  522. Jul 21, 2015Google: Wassenaar vulnerability rules ‘dangerously vague’ when clarity is crucial
  523. Jul 20, 2015Free Facebook Service Can Hunt Down Hacking Team Malware On Apple Macs
  524. Jul 20, 2015Costco, Sam’s Club, others halt photo sites over possible breach
  525. Jul 19, 2015Despite Triage, US Federal Cybersecurity Still Lags Behind
  526. Jul 19, 2015Windows XP Anti-Malware Support Terminated – 180 Million Users Left Vulnerable
  527. Jul 17, 2015Rejoice! Spam rate hits 12-year low
  528. Jul 16, 2015Senate Privacy Bill Puts Constraints on Student Data Use
  529. Jul 16, 2015Bloke thrown in the clink for hacking SIXTY PER CENT of Americans
  530. Jul 13, 2015United Airlines pays hacker one million air miles in bug bounty reward
  531. Jul 13, 2015OPM repercussions might never be fully understood, says former White House cybersecurity advisor
  532. Jul 12, 2015Your Photos Might Be Getting Uploaded On Google Without Your Knowledge
  533. Jul 12, 20152016: The Year We Claim Our Privacy Back
  534. Jul 12, 2015Apple Pay Adds Support for Discover Cards
  535. Jul 12, 2015SWIFT: Africa Leads Payment and Security Transactions Volume Growth
  536. Jul 12, 2015Gemalto’s Ezio Fights Fraud for Future Online Banking Risks
  537. Jul 12, 2015Tipalti Extends ACH Payments Services to 58 Countries Worldwide
  538. Jul 12, 2015Alipay Aims to Become an All-In-One Payment Platform
  539. Jul 11, 2015Get Over It, You Are A Service Provider
  540. Jul 11, 2015Three UK politicians hacked while using open WiFi networks
  541. Jul 11, 2015One Million Android Users Infected With Facebook Hacking Malware Apps
  542. Jul 11, 2015Walmart Canada looks into possible credit card data breach Add to …
  543. Jul 11, 2015Same-Day ACH Payments Move Closer to Reality
  544. Jul 11, 2015Alfa-Bank customers get contactless watches to make payments
  545. Jul 11, 2015American Express unveils online checkout service
  546. Jul 8, 2015Hacking Team Hacked – What You Need To Know
  547. Jul 8, 2015Exploit kits observed using Flash Player zero-day bug, Adobe issues fix
  548. Jul 8, 2015Can the government balance encryption access with privacy?
  549. Jul 8, 2015XKeyscore Exposé Reaffirms the Need to Rid the Web of Tracking Cookies
  550. Jul 8, 2015Our Top Five Takeaways From Today’s Hearings on Encryption
  551. Jul 7, 2015NSA’s spying on UN and others detailed in newly published documents
  552. Jul 6, 2015British Taxpayers Are Funding the UK’s Mass Surveillance Program
  553. Jul 6, 2015Nothing Is Untraceable: How The HackingTeam Got Busted
  554. Jul 6, 2015Hacking Team sold spying tools to repressive regimes, hack reveals
  555. Jun 26, 201520 Free VPN Services – Best of
  556. Jun 26, 2015Need to lock down your phone? These security apps are some of the best
  557. Jun 26, 201510 ways to prevent a data breach and protect your small business Add to …
  558. Jun 26, 2015Passwords Are Dead. Here’s What’s Next for Cybersecurity
  559. Jun 22, 2015Hackers steal data using gadget inside pitta bread
  560. Jun 19, 2015How DuckDuckGo Rode A Wave Of Post-Snowden Anxiety To Massive Growth
  561. Jun 15, 2015LastPass warns customers to change master passwords following suspicious activity
  562. Jun 13, 2015Navy openly solicits for 0-day bugs to weaponize
  563. Jun 8, 2015Samsung Smartwatch May Include Mobile Payments Function
  564. Jun 8, 2015Patator – Multi-threaded Service & URL Brute Forcing Tool
  565. Jun 6, 2015Subspace
  566. Jun 6, 2015Apple and the Self-Surveillance State – NYTimes.com
  567. Jun 5, 2015HSBC money laundering procedures ‘have flaws too bad to be revealed’
  568. Jun 5, 2015Alleged Chinese hacking, NSA revelations shed new light on cyberwarfare Add to …
  569. Jun 5, 2015Dwolla Now Offering No-Fee Transactions for All Users
  570. Jun 5, 2015Over One in Three UK Smartphone Owners Ready for NFC Mobile Payments
  571. Jun 5, 2015US Identifies and Destroys ISIS Headquarters Because of “Selfie”
  572. Jun 4, 2015Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border
  573. Jun 4, 2015Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border
  574. Jun 1, 2015Chase Mobile Unveils Touch ID Support For iPhone
  575. Jun 1, 2015Swatch Set to Join Mobile Payment Stakes This Summer
  576. Jun 1, 2015Chase Mobile Unveils Touch ID Support For iPhone
  577. May 31, 2015Mitek to Launch Photo Verify, a Robust Mobile ID Verification Tool
  578. May 31, 2015OWASP Zed Attack Proxy – Integrated Penetration Testing Tool
  579. May 31, 2015LTB E217 – The Bitcoin Block Size Discussion
  580. May 27, 2015Facebook ‘Marauder’s Map’ turns Messenger into a stalker’s dream
  581. May 27, 2015TechSecurity in a time of breaches? Microsoft touts beefed-up database encryption
  582. May 27, 2015Rare iOS bug can cause text messages to crash your iPhone
  583. May 24, 2015LTB E213 – Undertow
  584. May 20, 2015The First Bug Bounty Program for Airlines May Be Detrimental to Customer Safety and Security
  585. May 20, 2015Darkwallet and Armory Come Top in Bitcoin Wallet Privacy Study
  586. May 20, 2015Combo Breaker, a DIY tool to easily crack many Master padlocks
  587. May 18, 2015A bitcoin miner in every device and in every hand — Medium
  588. May 16, 2015Switching from Google Authenticator or Authy to 1Password
  589. May 16, 2015FBI: researcher admitted to hacking plane in-flight, causing it to “climb”
  590. May 16, 2015Tails 1.4 is out to preserve your privacy and anonymity
  591. May 12, 2015Washington state police now need warrants to spy on cellphones
  592. May 12, 2015A former top Canadian spy told us about 4 huge cyber threats that are emerging
  593. May 12, 2015Google Hangouts encryption doesn’t offer you the privacy protection you thought
  594. May 12, 20157 Common Misconceptions About Security Threats In Cloud Computing
  595. May 11, 2015Microsoft Edge is dropping ActiveX and old-school plugins for better security
  596. May 11, 2015Quantum computing is about to make big trouble for cybersecurity
  597. May 9, 2015Report: Visa in Talks to Buy Former Subsidiary Visa Europe for up to $20 Billion
  598. May 9, 2015The No. 1 mistake hackers hope you make
  599. May 8, 2015Where’s the Biggest Place in the World for Mobile Payments?
  600. May 7, 2015Court Rules NSA Phone Surveillance Illegal, But Saves Bigger Questions For Later
  601. May 7, 2015It looks like ‘Android M’ will deliver one of Android fans’ most wanted features
  602. May 6, 2015Privacy Experts Warn Of Peeping Drones Spying On All Of Us
  603. May 5, 2015France Is One Step Closer To Adopting Extensive Surveillance Law
  604. May 5, 2015How the NSA Converts Spoken Words Into Searchable Text
  605. May 5, 2015Court Rules Police Don’t Need A Warrant To Get Your Cellphone Records
  606. May 2, 2015Passwords are so 2014: Questions about your mobile activity may improve login security
  607. May 2, 2015Tor Browser 4.5 released! It comes with many improvements
  608. May 2, 2015Meet Tanium, The Secret Cybersecurity Weapon Of Target, Visa And Amazon
  609. Apr 30, 2015Max out your privacy with Apple
  610. Apr 27, 2015InstaMed Brings Apple Pay to the Healthcare Industry
  611. Apr 27, 2015Oberthur Technologies Unveils More Secure Payment Cards
  612. Apr 27, 2015The Unfortunate Growth Sector: Cybersecurity
  613. Apr 27, 2015
  614. Apr 27, 2015Hacker Implants NFC Chip In His Hand To Bypass Security Scans And Exploit Android Phones
  615. Apr 26, 2015Pass the password, please
  616. Apr 25, 2015How do we protect our digital legacy after death?
  617. Apr 25, 2015Improve Your Internet Privacy In 15 Minutes
  618. Apr 23, 2015Apple Steps Up its Lobbying Efforts in Mobile Payments
  619. Apr 20, 2015Verizon’s 2015 Data Breach Report Shows Threats Old and New to Watch
  620. Apr 20, 2015Coinbase: North Carolina’s Bitcoin Regulation is ‘Sensible’
  621. Apr 19, 2015EvilAP Defender – Detect Evil Twin Attacks
  622. Apr 19, 2015New Zealand Plotted Hack on China With NSA
  623. Apr 18, 2015Wordfence plugin secures WordPress sites; solves job from hell
  624. Apr 18, 2015Russia-linked Hackers Used Two Zero-Days in Recent Targeted Attack: FireEye
  625. Apr 18, 2015FBI watched as hacker dumped Bell Canada passwords online
  626. Apr 18, 2015Java – New vulnerabilities affects million applications
  627. Apr 18, 2015How To Deter Cyber Criminals? “Good Guys” Will Share Data Socially
  628. Apr 16, 2015China’s Great Cannon
  629. Apr 16, 2015How to Make Working from Home More Productive
  630. Apr 16, 2015Upward Trend in China’s Bonded Logistics Properties Linked to International Payments and Trade
  631. Apr 16, 2015PayPal/eBay Split Means New Opportunities
  632. Apr 15, 2015Google Chrome 42 Stomps A LOT Of Bugs & Disables Java By Default
  633. Apr 15, 2015Why multitasking is bad for our brains
  634. Apr 15, 2015The Top Five Hacker Tools of 2015
  635. Apr 15, 2015A Big Reason Why Most Electronic Surveillance…
  636. Apr 14, 2015The NSA wants tech companies to give it ‘front door’ access to encrypted data
  637. Apr 14, 2015NSA and the Stasi – a cautionary tale on mass surveillance
  638. Apr 14, 2015Sprint paying $15.5 million to feds to settle wiretapping fee lawsuit
  639. Apr 14, 2015FireEye Uncovers Decade-Long Cyber Espionage Campaign Targeting South East Asia
  640. Apr 14, 2015Can The Elephant Dance To The IoT Tune?
  641. Apr 14, 2015WordPress “Backup” Duplicator Plugin is vulnerable [UPGRADE IMMEDIATLY]
  642. Apr 14, 2015NSA dreams of smartphones with “split” crypto keys protecting user data
  643. Apr 14, 2015Firefox tweaks that will enhance your privacy on internet
  644. Apr 13, 2015Booby-trapped Hugo Boss Advert Spreads Cryptowall Ransomware
  645. Apr 13, 201518-Year-Old Security Flaw Allows Hackers To Steal Credentials From All Versions Of Windows
  646. Apr 13, 2015Survey: 65 percent of online tax filers do so on open access WiFi network
  647. Apr 13, 2015Move: Anonymous whistleblower appears to confirm fears of data theft by Zillow
  648. Apr 13, 2015IBM: ‘Dyre Wolf’ Cyber Gang Uses Spear Phishing For $1 Million Cyberheists
  649. Apr 13, 2015OpIsrael: Anonymous Hacks Israeli Arms Importer Website, Leaks Thousands of Login Data
  650. Apr 13, 2015India: City police to use pepper-spray drones
  651. Apr 13, 2015Tv5Monde revealed his own passwords in an interview
  652. Apr 12, 2015China’s ‘Great Cannon’ can intercept and redirect web traffic
  653. Apr 11, 2015Encryption Becomes a Part of Journalists’ Toolkit
  654. Apr 11, 20158 Reasons to Install the iOS 8.3 Update Right Now
  655. Apr 11, 2015Github Attack Perpetrated by China’s Great Cannon Traffic Injection Tool
  656. Apr 11, 2015New South Wales Attacks Researchers Who Found Internet Voting Vulnerabilities
  657. Apr 10, 2015List of Printers Which Do or Do Not Display Tracking Dots
  658. Apr 10, 2015Facebook hits back at study claiming it had breached EU privacy law, concedes there was a ‘bug’
  659. Apr 10, 2015Apple Leaves ‘Rootpipe’ Backdoors In 3 Per Cent Of All PCs On The Planet
  660. Apr 10, 2015Amazon Launches Fully Managed Elastic File System–NAS Vendors Tremble
  661. Apr 10, 2015?Securing the web once and for all: The Let’s Encrypt Project
  662. Apr 10, 2015Norse – New Shellshock Worm Lurks in the Wild
  663. Apr 10, 2015Snowden’s security tip: ‘Shift your thinking from passwords to passphrases’
  664. Apr 10, 2015iOS 8.3 Jailbreak: Apple Patches Yet Another TaiG Exploit
  665. Apr 9, 2015Apple fixes loads of security holes in OS X, iOS, Apple TV, Safari
  666. Apr 9, 2015Google Chrome Extension Criticized for Data Collection
  667. Apr 9, 2015Microsoft Is Making a Stripped-Down Windows to Rival Linux
  668. Apr 9, 2015Senate creating secret encyclopedia of US spy programs
  669. Apr 9, 2015Network Time Protocol Daemon MAC Checking Failure Authentication Bypass Vulnerability
  670. Apr 9, 2015Bringing Transparency to Patent Law
  671. Apr 9, 2015NY Cops Reveal Using Stingray Spy Tool 47 Times Without Warrant
  672. Apr 9, 2015?‘Fight 215’ coalition unveils campaign to end Patriot Act spy law
  673. Apr 8, 2015Security Vendor Trustwave Bought By Singtel For $810M
  674. Apr 8, 2015eBay Just Set a Bad Precedent by Giving in to Russia’s Demands for User Data
  675. Apr 8, 2015Windows XP still in use on millions of machines
  676. Apr 8, 2015Human Rights Watch Sues DEA Over Bulk Collection of Americans’ Telephone Records
  677. Apr 8, 2015What to Use: Resume or LinkedIn?
  678. Apr 8, 2015CSA to hold hackathon featuring $10,000 prize
  679. Apr 8, 2015Russian Hackers Have Been in White House System for Months, Officials Say
  680. Apr 8, 2015Drive-by-login attack identified and used in lieu of spear phishing campaigns
  681. Apr 8, 2015DEA Surveillance Program Harvested Americans’ Call Records—And It Took Snowden’s Disclosures to End It
  682. Apr 8, 2015Popular mobile security app uses worthless encryption method
  683. Apr 8, 2015FBI Public Service Annoucement: Defacements Exploiting WordPress Vulnerabilities
  684. Apr 8, 2015Hackers who breached White House network allegedly accessed sensitive data
  685. Apr 8, 2015Why privilege matters in privacy advice
  686. Apr 7, 2015Bell’s Targeted Ad Tracking Program Violates Canadian Law: Privacy Commissioner
  687. Apr 7, 2015Uber Co-Founder’s Startup ‘Operator’ Will Get You What You Want
  688. Apr 7, 201530 Sexy Resume Templates Guaranteed to Get You Hired
  689. Apr 7, 2015Nearly 75 percent of Global 2000 orgs still vulnerable to Heartbleed
  690. Apr 7, 2015Energy companies around the world infected by newly discovered malware
  691. Apr 7, 2015A bloody mess: Vast majority of organizations are still vulnerable to Heartbleed
  692. Apr 6, 2015Post-Cryptanalysis, TrueCrypt Alternatives Step Forward
  693. Apr 6, 2015Gmail Glitch Caused Problems, Potential Privacy Concerns for ‘a Majority of Users’
  694. Apr 6, 2015Mobile Threat Monday: Please Stop Installing Android Flashlight Apps
  695. Apr 6, 2015Snapchat issues first transparency report on law enforcement data requests
  696. Apr 6, 2015Feds ponder jamming journo comms in Parliament
  697. Apr 6, 2015The NSA may not be listening to your private phone calls, but it has been watching your private parts
  698. Apr 6, 2015CRYPVAULT: New Crypto-ransomware Encrypts and “Quarantines” Files
  699. Mar 7, 201521 tips, tricks and shortcuts to help you stay anonymous online
  700. Mar 7, 2015Google’s ‘encrypted-by-default’ Android is NOT encrypting by default – The Register
  701. Mar 7, 2015Why Clinton’s Private Email Server Was Such a Security Fail – Wired
  702. Mar 7, 2015Man suspected of hacking U.S. military satellite data arrested in UK – CNN.com
  703. Mar 7, 2015The auto industry is serious about connected car privacy – The Hill (blog)
  704. Mar 7, 2015Mega-Breaches: Notification Lessons
  705. Feb 27, 2015Senators Move to End Deadlock Over Funding of Homeland Security – New York Times
  706. Feb 27, 2015Dutch SIM maker Gemalto says NSA, UK GCHQ “probably” hacked, but no “massive theft” of encryption keys
  707. Feb 27, 2015Tor Browser 4.0.4 Released
  708. Feb 27, 2015PayPal and eBay file regulatory forms in preparation for breakup later this year
  709. Feb 26, 2015From Hacking Systems To Hacking People
  710. Feb 26, 2015Bitcoin revolution could be the next internet, says Bank of England – Telegraph
  711. Feb 25, 2015Facebook Policies Taken to Task in Report for Data-Privacy Issues – Wall Street Journal
  712. Feb 25, 2015Snowden: Spy Agencies ‘Screwed All of Us’ in Hacking Crypto Keys – Wired
  713. Feb 25, 2015Why Firmware Is So Vulnerable to Hacking, and What Can Be Done About It – Wired
  714. Feb 21, 2015Bitcoin for the buffedled
  715. Feb 21, 2015How to Craft a Compelling Storyline for Your Company
  716. Feb 21, 2015Are Bitcoins Funding ISIS? | PYMNTS.com
  717. Feb 21, 2015Payment Processor Stripe Now Allows Any Business to Accept Bitcoin – CoinDesk
  718. Feb 20, 2015Samsung acquires LoopPay to help drive mobile wallet plans
  719. Feb 20, 2015Dell Expands Bitcoin Payments to UK and Canada
  720. Feb 20, 2015Privacy & Cybercrime Use The Same Tools – InformationWeek
  721. Feb 20, 2015Cyber-Security Firm: NSA-Linked Spyware Found in Hard Drives Worldwide
  722. Feb 20, 2015Finextra news: European surge in contactless payments opens the door to mobile
  723. Feb 19, 2015The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle
  724. Feb 19, 2015Parkt Opens Its Parking Rewards System to Bitcoin Users
  725. Feb 19, 2015Samsung Makes Move Into Mobile Payments – Wall Street Journal
  726. Feb 19, 2015Ramping Up Automobile Cybersecurity
  727. Feb 18, 2015Experts judge ‘$1bn bank hack’ claim
  728. Feb 18, 2015Visa to Remove 16-Digit Account Number in Online and Mobile Payments | Business Wire
  729. Feb 18, 2015Obama says that Europeans are using privacy rules to protect their firms … – Washington Post (blog)
  730. Feb 18, 2015Five free OS X data encryption utilities | ZDNet
  731. Feb 18, 2015Bitcoin Core 0.10 Gives Developers Simplified Access to Network Concensus – CoinDesk
  732. Feb 18, 2015President Obama says he leans more towards strong encryption than law enforcement
  733. Feb 18, 2015Web privacy is the newest luxury item in era of pervasive tracking – Christian Science Monitor
  734. Feb 18, 2015“The Equation group:” Hackers have infected computers worldwide with the … – fox6now.com
  735. Feb 17, 2015AT&T charges $29 for privacy. Time for others to do the same – Gigaom
  736. Feb 17, 2015BITCOIN: A flawed currency blueprint with a potentially useful application for the Eurozone
  737. Feb 17, 2015Breaking the bank: Bitcoins hit Africa’s money transfer traditions – CNN
  738. Feb 17, 2015Hacked Hardware Could Cause The Next Big Security Breach – Popular Science
  739. Feb 17, 2015Credit cards and mobile payments critical for small businesses
  740. Feb 17, 2015Network Security Operations Analyst | hyperWALLET Systems Inc. Job on T-Net
  741. Feb 17, 2015A security firm claims it was Russia that hacked Sony — and that it still has access
  742. Feb 17, 2015What we know about the bank hacking ring – and who’s behind it
  743. Feb 17, 2015Microsoft Azure Adopts ISO/IEC 27018, First International Set Of Privacy Controls In The Cloud
  744. Feb 17, 2015These are 15 of the most notorious hackers ever
  745. Feb 17, 2015Porn phishing attacks used to hit Israeli sites
  746. Feb 17, 2015Software lets people track Whatsapp users by despite privacy settings 
  747. Feb 17, 2015A secret US hacking group could spy on you — even without the internet
  748. Feb 17, 2015New Technologies Shake Up Old Money | MIT Technology Review
  749. Feb 17, 2015Finextra: Visa launches mobile location service to cut declined card payments
  750. Feb 17, 2015The Root of the Problem: How to Prevent Security Breaches – Wired
  751. Feb 17, 2015Opinion: Apple Pay is easier than swiping a card … until it’s not
  752. Feb 16, 2015Why Box hasn’t solved the cloud encryption conundrum – IT PRO
  753. Feb 16, 2015A wave of financial tech firms is shaking up the world of banking
  754. Feb 16, 2015BTER Exchange Claims $1.75m in Bitcoin Stolen in Cold Wallet Hack – CoinDesk
  755. Feb 16, 2015News | Apply Financial
  756. Feb 16, 2015Hackers Stole Hundreds of Millions in Massive Malware Bank Heist
  757. Feb 16, 2015Xbox Live Downed By Lizard Squad through DDoS attack
  758. Feb 16, 2015Denver man falls victim to TurboTax hack – 9NEWS.com
  759. Feb 16, 2015Cybersecurity Summit Exposes Silicon Valley’s Privacy Fears – Wall Street Journal
  760. Feb 16, 2015Obama set to ratchet up pressure over Homeland Security funding
  761. Feb 16, 2015Hackers steal up to $1 billion from banks, security co. says (Update)
  762. Feb 16, 2015McAfee wants to replace Password with Biometric in its next security solution
  763. Jan 5, 2015Gogo issues fake HTTPS certificate to YouTube users.
  764. Jan 1, 2015Google engineer finds critical security flaw in Windows
  765. Dec 28, 2014Why You Should Change Your Amazon Password Now
  766. Dec 18, 2014The FBI Used the Web’s Favorite Hacking Tool to Unmask Tor Users | WIRED
  767. Dec 7, 2014What say do banks have in the creation of ACH networks by startups and corporations?
  768. Nov 13, 2014ISPs Removing Their Customers’ Email Encryption
  769. Nov 12, 2014Microsoft Schannel Vulnerabilty – Patch It NOW – Darknet – The Darkside
  770. Nov 6, 2014The ASV Process Is Broken – Part 3
  771. Nov 5, 2014Bandwagon’s – The Good and the Bad?
  772. Nov 4, 2014Verizon Injecting Perma-Cookies to Track Mobile Customers, Bypassing Privacy Controls
  773. Oct 9, 2014Do Not Jump To Conclusions
  774. Sep 26, 2014Everything You NEED To Know About Shellshock Bug In BASH – Darknet – The Darkside
  775. Sep 26, 2014Daring Fireball: Security Trade-Offs
  776. Sep 26, 2014oss-sec: Re: CVE-2014-6271: remote code execution through bash
  777. Sep 18, 2014Here’s How the Security Behind Apple Pay Will Really Work | Bank Innovation
  778. Sep 18, 2014A simple explanation of how Apple Pay works (probably): It’s all about tokenization
  779. Sep 7, 2014Mobile Money: The Battle for Africa
  780. Sep 7, 2014Comparing ISO/IEC 27001:2013 ISMS to SANS CSC TOP 20, NERC-CIP, PCI DSS
  781. Sep 7, 2014Photo hacking rekindles digital privacy worries
  782. Sep 7, 2014Bitcoin ATMs are cropping up
  783. Sep 7, 2014Bitcoin Voucher Startups Aim to Help Africa’s Unbanked
  784. Sep 6, 2014Hacked Celebrity Photos Triggers Concerns About Privacy and Cloud…
  785. Sep 6, 201410 Secrets of What Great Leaders Know and Do
  786. Sep 6, 2014Apple Negotiates Lower Transaction Fees With Credit Card Issuers for Mobile …
  787. Sep 6, 2014iWatch mobile payments could change everything
  788. Sep 6, 2014Top 10 Web-Based Personal Project Management Tools
  789. Sep 6, 2014The FBI Finally Says How It ‘Legally’ Pinpointed Silk Road’s Server
  790. Sep 6, 2014What Marketing Experts Can Learn From Project Management Pros – Forbes
  791. Sep 6, 2014Will Square’s New Cash App Punish PayPal? (EBAY)
  792. Sep 5, 2014Password Managers: Attacks and Defenses | USENIX
  793. Sep 2, 2014Around The Coin (Podcast): Episode 30
  794. Sep 2, 2014Apple reportedly strikes deal with Amex, Visa and MasterCard to bring mobile payments to the iPhone | MobileSyrup.com
  795. Sep 2, 2014YouTube Now Offers Fan Funding In Four Countries – Here’s A Look At How It Works
  796. Aug 29, 2014Assessing control effectiveness—an essential part of every risk assessment – ISACA Now
  797. Aug 27, 2014The 5 New Rules of Face-To-Face Communication
  798. Aug 26, 2014The Gyroscopes in Your Phone Could Let Apps Eavesdrop on Conversations | Threat Level | WIRED
  799. Aug 25, 2014A Few Thoughts on Cryptographic Engineering: What’s the matter with PGP?
  800. Aug 25, 2014Garmr – Automate Web Application Security Tests – Darknet – The Darkside
  801. Aug 24, 2014Payments and Social Media are on a Collision Course by Around the Coin on SoundCloud
  802. Aug 21, 2014How hackers used Google to steal corporate data
  803. Aug 20, 2014Heartbleed Implicated In US Hospital Leak – Darknet – The Darkside
  804. Aug 19, 2014Stopping Credit Card Frauds? Smart Cards are coming!
  805. Aug 18, 2014How to Stop Google Maps from Remembering Everywhere You Go, All the Time
  806. Aug 18, 2014Passera – Generate A Unique Strong Password For Every Website – Darknet – The Darkside
  807. Aug 15, 2014Hiding A Bitcoin Mining Botnet In The Cloud – Darknet – The Darkside
  808. Aug 14, 2014Security As A Class Of Interface Guarantee
  809. Aug 14, 2014Pragmatic look at PCI DSS v3.0 changes – ISACA Now
  810. Aug 14, 2014XML Quadratic Blowup Attack Blows Up WordPress & Drupal – Darknet – The Darkside
  811. Jul 24, 2014Clear Your Cookies? You Can’t Escape Canvas Fingerprinting – Darknet – The Darkside
  812. Jul 19, 2014Edward Snowden: Dropbox is ‘hostile to privacy’ – PCWorld (blog)
  813. Jul 18, 2014Five settings every privacy-conscious iPhone owner should change – tuaw.com
  814. Jul 18, 2014Mobiles used on trading floor get biometric-enhanced compliance solution | Planet Biometrics News
  815. Jul 18, 2014How Russian Hackers Stole the Nasdaq
  816. Jun 5, 2014Facebook Privacy: 10 Settings To Check – InformationWeek
  817. May 30, 2014Begrudgingly, Google Offers a Form for People Who Want to Be Forgotten
  818. May 29, 20146 Models of Blended Learning – Infographic
  819. May 29, 2014Transformational Leadership: 10 Coaching Tips to Maximize Performance
  820. May 29, 20145 Management Tips for Developing a Successful Team
  821. May 28, 2014Top 20 Worst Passwords that can Hack Private Accounts | All Infographics
  822. May 21, 2014ebay Compromise
  823. May 17, 2014LifeLock security alert
  824. May 12, 2014Miners Manifesto
  825. May 11, 2014What Are iBeacons All About? by Around the Coin on SoundCloud
  826. May 9, 2014One Of The Hidden Reasons Apple Is Buying Beats.
  827. May 7, 2014Mining Bitcoin
  828. May 6, 2014Inventory your home for insurance
  829. May 5, 2014What is interchange?
  830. May 4, 2014What happens when a credit card is used?
  831. May 3, 2014How does the payments ecosystem work?
  832. May 3, 2014How does a remittance money transfer work? What are all the steps and who is involved?
  833. Apr 18, 2014Interesting Banking Trends
  834. Dec 28, 2013Anatomy of an Android update
  835. Dec 18, 2013How a bitcoin transaction works?
  836. Jul 27, 2013Facebook, are you sharing too much on it?
  837. Jun 30, 2013Looking for employment?
  838. Mar 31, 2013Opt out of personalized advertising
  839. Mar 2, 2013Pentesting Tools
  840. Apr 25, 2012Google Drive
  841. Jan 22, 2012Upgrade Scoop.It RSS feed to a blog in Empire Avenue
  842. Jan 15, 2012ROCK #TWITTER: The Organic Way Of Getting More Retweets
  843. Jan 15, 2012White Hat Linking
  844. Jan 7, 2012How to use Google Analytics to Drive more Traffic to Your Website
  845. Jan 1, 2012Security & Privacy Best Practices online
  846. Dec 25, 2011Establishing Web Presence for your Business
  847. Dec 19, 2011Protect your privacy while using social websites
  848. Dec 7, 2011Article: Hacker Ports Android ‘Ice Cream Sandwich’ to Kindle Fire Tablet
  849. Oct 10, 2011Google unveils DART, a new web programming language
  850. Oct 8, 2011Facebook cloaking attack vulerability
  851. Oct 7, 2011OpenStack gaining momentum
  852. Sep 29, 2011Burglars using social media!
  853. Sep 29, 2011Supercookies?
  854. Sep 28, 2011RIM in trouble again
  855. Sep 27, 2011Untitled
  856. Sep 5, 2011Google, Mozilla and Microsoft ban the DigiNotar Certificate Authority in the…
  857. Sep 5, 2011BackBox Linux 2 for penetration testers
  858. Sep 5, 2011Rogue SSL certs were also issued for CIA, MI6, Mossad
  859. Sep 4, 2011Web code hints Find My Friends on its way to Apple iCloud
  860. Sep 4, 2011DNS hack hits popular websites: Telegraph, Register, UPS
  861. Aug 28, 2011PROTECT IP threatens the future of DNS security
  862. Aug 28, 2011How Businesses Use Social Media for Recruiting
  863. Aug 28, 2011Google+ Is An Identity Service (Fred Wilson/A VC)
  864. Jul 31, 2011Anyone Can Access Microsoft’s Massive Location Database and See Where Your L…
  865. Jul 31, 2011Facebook To Start Paying Bug Bounties
  866. Jul 31, 2011Researchers Say Vulnerabilities Could Let Hackers Spring Prisoners From Cells
  867. Jul 17, 2011WP7 Connector now puts your Home Server in your hand
  868. Jul 17, 2011Virgin Mobile USA To Start Throttling Data Speeds in October (tag:ISP)
  869. Jul 17, 2011Verizon and AT&T LTE Not Compatible (tag: LTE)
  870. Jul 10, 2011Enact Fifth Amendent to get laptop password
  871. Jul 9, 2011Syringe: Cool whitehat tool!
  872. Jul 9, 2011New IOS Jailbreak capability
  873. Jun 5, 2011iCloud & Time Capsule integration for desktop anywhere?
  874. Jun 5, 2011New password cracking tools….GPU?
  875. Jun 4, 2011Assertive or Aggressive
  876. Jun 4, 2011Wireless Keyboard & Mouse and OTA keystroke spies
  877. Jun 4, 2011Finally, cellphone safety!
  878. Jun 3, 2011File sharers & Human rights?
  879. Jun 3, 2011Facebook credits cashable at PayPal
  880. Apr 17, 2011Privacy….RIM and now Nokia
  881. Apr 17, 2011RIM Playbook worth it?
  882. Jan 1, 2009LinkedIn, Facebook, MySpace, Twitter, etc.. and your Privacy!
  883. May 26, 2008How safe is Virtualization?
  884. May 11, 2008Social-networking apps?
  885. May 3, 2008Risk Assessment
  886. May 2, 2008PCI DSS
  887. May 2, 2008VIOP Phone awes
  888. Apr 12, 2008RSA2008
  889. Mar 1, 2008Always delete data on old disk drives
  890. Jan 20, 2008GE Money looses customer private data tapes
  891. Jan 10, 2008U.S. and Privacy….like mixing water and oil.
  892. Oct 6, 2007MediaDefender’s emails exposed by hackers
  893. Sep 18, 2007TD Ameritrade hacked!
  894. Sep 13, 2007Google Maps Street View violates Canadian Privacy Laws
  895. Sep 10, 2007Parts of PATRTIOT ACT scrutinized
  896. Sep 5, 2007DHS abandons anti-privacy data mining program
  897. Sep 3, 2007Wikipedia entry cleaned up
  898. Sep 2, 2007Monster.com information theft not really a hack?
  899. Aug 31, 2007Privacy…do you take it lightly?
  900. Aug 30, 2007NASA, Caltech sued by scientists because of un-constitutional background checks.
  901. Aug 29, 2007IRS Computer Security problems?
  902. Aug 28, 2007Car door locks hacked!
  903. Aug 27, 2007iPhone unlocked!
  904. Aug 26, 2007Monster.com hacked!
  905. Aug 11, 2007Corporate intranet blogs
  906. Aug 9, 2007
  907. Aug 8, 2007Importance of data classification
  908. Aug 6, 2007Internet Security