hacking in pictures
Following Tuesday's hacking of the Associated Press' Twitter account, the microblogging site is reportedly working on a two-step authentication security solution to help prevent future hijackings.
Whether it is on the phone, online or in person, here are ten lies hackers, phishers and social engineers will tell you to get what they want
The Australian Defence Force Academy (ADFA) has been slammed by an Australian security expert for using “weak” passwords stored in plain text which were stolen by a hacker known as Darwinare in November.
Before I get to this week's main topic I must give a big thumbs-up to a book that all of you who like to cook will thoroughly enjoy: "Cooking for Geeks: Real Science, Great Hacks, and Good Food" by Jeff Potter (pub. O'Reilly).
600,000 Facebook accounts were "compromised" yesterday, or thereabouts.
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet
Last week Gen. David Petraeus, the director of the Central Intelligence Agency, resigned in response to what has turned out to be a much bigger scandal than it first appeared.
2011 so far has been filled with news of high-profile hacking - the Epsilon data breach, Microsoft and the various attempts of the nefarious Anonymous. Even the Australian Government copped a little unwanted interest. With this in mind, we thought it was time to track down the top ten Hollywood movies about hacking.
Whitepapers about hacking
Sign up now »
The most comprehensive assessment of the current state of enterprise application quality and testing practices available from around the world. With our 1550 respondents, Capgemini, HP & Sogeti bring you ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Low-level analysis can find, map data deleted from Android phones
- Cybercrime Survey: Almost half of small business victims
- AusCERT 2013: Cloud-based scanner identifies new malware by its ancestry
- AusCERT 2013: What's it like to be a 'Nigerian scam' victim?
- AusCERT 2013: Ashley Deuble: Network Security Monitoring with Security Onion
- Lack of information, skills hinder finance-business partnering: Deloitte
- Apple defends offshore decisions that result in low taxes
- Vodafone revenue and profit drop as European troubles continue
- Apple to tell Senate it pays every cent of its taxes
- Cash visibility tops list in first Asia-Pacific treasury report