Category: Computer Security

Surveillance watchdog concludes metadata program is illegal, “should end” | Ars Technica

Surveillance watchdog concludes metadata program is illegal, “should end” | Ars Technica.

Posted: January 23, 2014 in Computer, Security

Bitcloud project plans to ‘replace’ the Internet | ITProPortal.com

Bitcloud project plans to ‘replace' the Internet | ITProPortal.com.

Posted: January 23, 2014 in Computer, Internet, Security

Android VPN flaw found, exposes protected data | ZDNet

Android VPN flaw found, exposes protected data | ZDNet.

Posted: January 22, 2014 in Computer, Security

inessential.com: Network Solutions Auto-Enroll: $1,850

inessential.com: Network Solutions Auto-Enroll: $1,850.

Posted: January 21, 2014 in Computer, Security

Evidence my ISP is tracking their customers and selling the data.

Evidence my ISP is tracking their customers and selling the data..

Posted: January 5, 2014 in Computer, Internet, Security

Disturbed by NSA Spying? Disney World’s New “Magic Bands” Track Guests

Disturbed by NSA Spying? Disney World's New "Magic Bands" Track Guests.

Posted: January 2, 2014 in Computer, Editorial, Security

Sorry for letting them snoop? Dell apologizes for ‘inconvenience’ caused by NSA backdoor — RT USA

Sorry for letting them snoop? Dell apologizes for ‘inconvenience’ caused by NSA backdoor — RT USA.

Posted: January 1, 2014 in Computer, Security

U.S. to China: We Hacked Your Internet Gear We Told You Not to Hack | Wired Enterprise | Wired.com

U.S. to China: We Hacked Your Internet Gear We Told You Not to Hack | Wired Enterprise | Wired.com.

Posted: December 31, 2013 in Computer, Security

The Daily Dot – The NSA has nearly complete backdoor access to Apple’s iPhone

The Daily Dot – The NSA has nearly complete backdoor access to Apple's iPhone.

Posted: December 30, 2013 in Computer, Security

The NSA’s elite hackers can hijack your Wi-Fi from 8 miles away | The Verge

The NSA's elite hackers can hijack your Wi-Fi from 8 miles away | The Verge.

Posted: December 30, 2013 in Computer, Security