Monthly Archives: August 2011
Imagine the scene: you buy a second-hand laptop and use it to, among other things, have secret sexy video chats with your significant other. Unbeknownst to you, naked photos of you are being taken by a company hired to track down the stolen laptop.
A teenage boy from Chester has been charged by British police in connection with a series of internet attacks by the Anonymous hacktivist group.
Meanwhile, another hacking suspect is denied access.. to his girlfriend.
Dear British Association of Anger Management,
Thank you for your unsolicited email, inviting me to a course on anger management.
Is Western Union trying to deliver money to you?
Or is a malware author trying to infect your Windows computer?
The Apache Foundation has released version 2.2.20 to address a denial of service vulnerability. Web admins using Apache should update as soon as possible.
WikiLeaks cables show Apple's strategy for cracking down on counterfeit Apple products (and stores!) included hiring anti-counterfeit specialists who previously spent their time finding fake Viagra.
Did hackers really hack into Julianne Hough's iPhone and steal her private photos?
The actress/singer/dancer may have not wanted this kind of exposure.
The Morto worm is making the headlines, targeting Windows networks with poorly-chosen weak passwords.
SophosLabs has only received a small number of reports of the worm being seen in the wild.
Received an email claiming to be a notification the Federal Deposit Insurance Corporation (FDIC)?
Beware a malicious spammed-out attack designed to infect Windows computers.
It appears that the experts in data leakage have accidentally lost some of their own data. Uncensored copies of the stolen diplomatic cables WikiLeaks was trusted with have been accidentally disclosed.
With children as young as five now being told it's mandatory to bring an iPad into the classroom, what can be done to ensure safe and secure surfing?
Reports from Pakistan suggest the country's telecomms authority is pressing ISPs to comply with regulations which restrict the use of end-to-end encryption.
But this won't improve security, even against militants. In general, it will make things worse.
I was contacted this morning to assist Mrs. M. Gaddafi with "sheltering" $40 million... Is it my lucky day or possibly the beginning of an identity theft scam?