Category: Computer Security

HTTPS can’t be trusted to obscure private online activity

HTTPS can't be trusted to obscure private online activity.

Posted: March 6, 2014 in Computer, Security

Red Hat programmer discovers major security flaw in Linux

Red Hat programmer discovers major security flaw in Linux.

Posted: March 6, 2014 in Computer, Security

BBC News – New magnetic material could boost electronics

BBC News – New magnetic material could boost electronics.

Posted: March 4, 2014 in Computer, Storage

Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping | Ars Technica

Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping | Ars Technica.

Posted: March 4, 2014 in Computer, Security

Apple’s iCloud security feature in OSX is bypassed in just 70 lines of code – Neowin

Apple's iCloud security feature in OSX is bypassed in just 70 lines of code – Neowin.

Posted: March 1, 2014 in Computer, Security

GCHQ identified Kinect as possible snooping tool; Microsoft denies all knowledge | Games industry news | MCV

GCHQ identified Kinect as possible snooping tool; Microsoft denies all knowledge | Games industry news | MCV.

Posted: February 28, 2014 in Computer, Security

How Steve Perlman’s “Revolutionary” Wireless Technology Works – and Why its a Bigger Deal than Anyone Realizes

How Steve Perlman's "Revolutionary" Wireless Technology Works – and Why its a Bigger Deal than Anyone Realizes.

Posted: February 28, 2014 in Computer, Internet

Intel kills SSD overclocking, unleashes its fastest-ever consumer drive – Computerworld

Intel kills SSD overclocking, unleashes its fastest-ever consumer drive – Computerworld.

Posted: February 27, 2014 in Computer, Storage

Infographic: New Ponemon SSH Security Vulnerability Report – Venafi

Infographic: New Ponemon SSH Security Vulnerability Report – Venafi.

Posted: February 26, 2014 in Computer, Security

RSA security attack demo deep-fries Apple Mac components – Network World

RSA security attack demo deep-fries Apple Mac components – Network World.

Posted: February 26, 2014 in Computer, Security