Monday, April 14th, 2008
A security researcher claims to have found a significant weakness in the wireless encryption of a DSL home gateway made by Thomson and distributed to broadband subscribers in the U.K. by network operator BT.
Exploiting the weakness could enable someone to connect to a victim's Wi-Fi router for malicious purposes such ...
Posted in Hardware, Internet, Security | No Comments
Friday, April 11th, 2008
Malicious hackers beware: Computer security expert Joel Eriksson might already own your box.
Eriksson, a researcher at the Swedish security firm Bitsec, uses reverse-engineering tools to find remotely exploitable security holes in hacking software. In particular, he targets the client-side applications intruders use to control Trojan horses from afar, finding vulnerabilities ...
Posted in Coding, Internet, Privacy, Security, Software | No Comments
Friday, April 11th, 2008
It's not only mission-critical business information that should be backed up. The data on your home PC needs to be backed up as well. But how should you choose between the traditional method of saving files on storage media yourself and a newer method of storing your data offsite with ...
Posted in Hardware, Networking, Security, Software | No Comments
Thursday, April 10th, 2008
The IronKey, designed to be the world’s most secure flash drive, protects your data, online passwords, and Internet privacy. Now you can safely carry your digital life with you wherever you go—with confidence and peace of mind. While it uses advanced security technologies previously only available to government agents and ...
Posted in Hardware, Privacy, Security | No Comments
Wednesday, April 2nd, 2008
A British security researcher has demonstrated a "biologging" system for intercepting biometric authentication data, warning that attacks on biometric systems could become relatively straightforward if current practices don't change.
Matthew Lewis, of London-based Information Risk Management, demonstrated a proof-of-concept biologger last week at Black Hat Amsterdam and released the tool's source ...
Posted in Hardware, Privacy, Security | No Comments
Page 28 of 30« First«...1020...2627282930»