free email and free web hosting internet services reviews
Saturday, July 5, 2008
Sunday, June 29, 2008
Nearly Half of IT Workers Snoop in Confidential Files
Nearly half of IT workers have admitted to snooping around networks to look at confidential information, according to research from software firm Cyber-Ark. "When it comes down to it, IT has essentially enabled snooping to happen. It's easy -- all you need is access to the right passwords or privileged accounts and you're privy to everything that'
read more
Автор
Pahom
на
12:06 AM
0
комментария(ев)
Ransomware Encrypts Victim Files With 1024-Bit Key
A dangerous new strain of malicious software that holds the victim's computers files for ransom has been unleashed, and researchers have yet to crack the encryption key.
read more
Автор
Pahom
на
12:06 AM
0
комментария(ев)
Hackers Crack London Tube's Ticketing System
Dutch security researchers rode the London Underground free for a day after easily using an ordinary laptop to clone the "smartcards" commuters use to pay fares, a hack that highlights a serious security flaw because similar cards provide access to thousands of government offices, hospitals and schools.
read more
Автор
Pahom
на
12:04 AM
0
комментария(ев)
Monday, May 19, 2008
Deep packet inspection under assault over privacy concerns
A Canadian law clinic has asked the country's Privacy Commissioner to take a closer look at the deep packet inspection being used by Bell Canada and others. While the technology also raises net neutrality concerns, in this case the issue is privacy.
read more
Автор
Pahom
на
12:54 AM
0
комментария(ев)
Security Flaw Turns Gmail into Open-Relay Server
A newfound flaw in Google's Gmail allows would-be spammers to treat the service as an open-relay server. Compounding the issue is the fact that services such as Hotmail and Yahoo "trust" Gmail. This may facilitate e-mail delivery, but it also makes it easier for spammers to reach their intended targets.
read more
Автор
Pahom
на
12:54 AM
0
комментария(ев)
The Internet as a Walled Garden?
Now it seems the only question is whether the government will be able to turn the net into a controllable, monitorable and trackable pre-internet AOL-type service or whether the chaotic net will live on as just another frontier for the military-industrial complex to start an arm's race and rake in billions of government dollars.
read more
Автор
Pahom
на
12:53 AM
0
комментария(ев)
Friday, February 29, 2008
Can you hear me now? Yes, yes I can. (GSM hacked for cheap)
The 64-bit encryption method used by GSM networks (AT&T/TMobile/etc), known as A5/1 has been theoretically crackable for 10 years now, but it was very expensive to do so. At Black Hat D.C. 2008 however, a $1,000 solution was unveiled that claims to crack it in 30 minutes, or for $100,000 it can be cracked in 30 seconds.
read more
Автор
Pahom
на
9:15 AM
0
комментария(ев)
Make Sure You Know When Someone Hacks Your Email
If someone has cracked your email password, it may not be apparent to you. A snooper can easily read an email then mark it as unread again. So the best thing to do would be to set up an “electronic tripwire” so if someone breaks into your account, you’ll know about it.
read more
Автор
Pahom
на
9:15 AM
0
комментария(ев)
How Internet Censorship Works
One of the early nicknames for the Internet was the "information superhighway" because it was supposed to provide the average person with fast access to a practically limitless amount of data. For many users, that's exactly what accessing the Internet is like. For others, it's as if the information superhighway has some major roadblocks in the form
read more
Автор
Pahom
на
9:14 AM
0
комментария(ев)