Category: Computer Security Software

$250K: That’s what Lenovo earned to RAT YOU OUT with Superfish • The Register

$250K: That's what Lenovo earned to RAT YOU OUT with Superfish • The Register.

Posted: March 6, 2015 in Computer, Security, Software

NSA inquiry chief suffers phone tampering – The Local

NSA inquiry chief suffers phone tampering – The Local.

Posted: March 4, 2015 in Computer, Security

Fraud Comes to Apple Pay – Digits – WSJ

Fraud Comes to Apple Pay – Digits – WSJ.

Posted: March 3, 2015 in Computer, Internet, Security

“FREAK” flaw undermines security for Apple and Google users, researchers discover

“FREAK” flaw undermines security for Apple and Google users, researchers discover.

Posted: March 3, 2015 in Computer, Editorial, Internet, Security

Facebook posts from U.S. land Pinellas contractor in Arab jail | TBO.com and The Tampa Tribune

Facebook posts from U.S. land Pinellas contractor in Arab jail | TBO.com and The Tampa Tribune.

Posted: March 2, 2015 in Computer, Editorial, Security

Rogue Router Firmware Chaos #Backdoor | Entrust:Blog

Rogue Router Firmware Chaos #Backdoor | Entrust:Blog.

Posted: February 28, 2015 in Computer, Editorial, Internet, Security, Software

FCC overturns state laws that protect ISPs from local competition | Ars Technica

FCC overturns state laws that protect ISPs from local competition | Ars Technica.

Posted: February 26, 2015 in Computer, Editorial, Internet, Security

FCC approves net neutrality rules, reclassifies broadband as a utility

FCC approves net neutrality rules, reclassifies broadband as a utility.

Posted: February 26, 2015 in Computer, Editorial, Internet, Security

Hacker Claims Feds Hit Him With 44 Felonies When He Refused to Be an FBI Spy | WIRED

Hacker Claims Feds Hit Him With 44 Felonies When He Refused to Be an FBI Spy | WIRED.

Posted: February 19, 2015 in Computer, Editorial, Security

Russian researchers expose breakthrough U.S. spying program | Reuters

Russian researchers expose breakthrough U.S. spying program | Reuters.

Posted: February 16, 2015 in Computer, Security