Powered by Drupal
31
Oct

Facebook sets up hidden service for Tor users

The social network is now accessible to Tor users using the address https://facebookcorewwwi.onion

31
Oct

Zdnet Security

31
Oct

Virginia police can now force you to unlock your smartphone with your fingerprint

A circuit judge likened police forcing smartphone owners to unlock their device with a fingerprint akin to providing a DNA sample or an actual key.

31
Oct

Zero Day Weekly: CurrentC hacked, White House breached, APT28 exposed, Verizon shamed

A collection of notable security news items for the week ending October 31, 2014. Covers enterprise, controversies, reports and more.

31
Oct

Acquia reaps reward from demand for unified platform

Acquia has experienced a revenue growth for the 22nd consecutive quarter, driven by the demand the company is receiving from global brands for its open-source web content management platform.

31
Oct

Six Clicks: Scariest Tech Trends of 2014

Yes, it's Halloween of 2014, and we're here to revisit the technologies that are so frightening, they'll make you evacuate from multiple "interfaces".

31
Oct

On metadata legislation and used-car salesmanship

Australia's proposed data-retention laws still leave too many questions unanswered. Turnbull and Brandis must fill in the blanks.

31
Oct

Film studios could use retained data to sue torrenters

Communications Minister Malcolm Turnbull has confirmed that copyright holders could sue ISPs to get hold of data retained as part of the government's mandatory data-retention regime.

30
Oct

Chrome set to disable and remove SSLv3 in upcoming releases

The next version of the Google Chrome browser expected in six weeks will arrive with support to fallback to SSLv3 disabled by default.

30
Oct

Cloud carries security risks, but biz benefits hard to ignore

Cost benefits make it tough for enterprises not to adopt cloud services in spite of the security risks, so they should embrace it by putting in place the necessary processes, say panelists at a discussion moderated by ZDNet blogger Eileen Yu.

Pages

Subscribe to SecGeeks - Information Security Tools, Blogs, Botnets, Vulnerability, Reversing RSS