Security, Page 8 ▼


Wireless Windows Sensors May Guarantee Better Intrusion Detection

09/07/2012, Window sensors are nothing new. Since long, they have been employed on windows to detect any intrusion. However, conventionally, such sensors come with cables. And that essentially means one could cut the cables or somehow mess with them to compromise the...

Apple UDID Leak: Why Does It Matter?

09/04/2012, Ealier today, AntiSec hackers claimed that they had been able to breach into FBI servers and gain access to a list of 12 million Apple UDIDs. The group leaked 1 million UDIDs online, claiming them to be a part of the list. The debate on the web has so far...

Dropbox Beefs Up Security With Two-Step Verification

08/27/2012, In recent times, a number of fairly secure platforms have faced hacking attacks. Many of these attacks were successful, for instance in the case of LinkedIn, where the hackers were able to lay their hands on millions of encrypted passwords. Thus it has...

Anonymous claims PSN breach, 10M accounts allegedly accessed

08/15/2012, Uh-oh, the Anonymous hacker group has claimed to have hacked the PlayStation Network, or PSN, and downloaded 50GB worth of database that contain user accounts and passwords. From the look of it, a lot of emails are from Sweden, Russia and other European...

Facebook announces dedicated email address to report phishing scams

08/09/2012, Following Facebook’s 10-Q report earlier this month that revealed a staggering number of fake accounts, roughly 83.09 million accounts all in all, Facebook is announcing a dedicated email address to report those scams. Facebook users can now report...

Amazon tightens security after hacking scandal

08/08/2012, Security is a vital part of our life. That’s why when we heard that Mat Honan’s iCloud account was hacked on Monday this week, we immediately followed the story. Apple was quick to respond by freezing the functionality to allow Apple ID...

Private WiFi beta 3.2 Hands-On

08/03/2012, There is no shortage of WiFi hacks horror stories, but free hotspots are just too convenient to ignore, so most people, including me, often connect at random places without worrying too much about the potential hacks that can happen. That’s exactly...

Morcut malware opens a backdoor in Mac OS X

07/26/2012, It sure feels like malware on Mac computers are getting a lot of attention recently. On the eve of Mac OS X Mountain Lion’s launch, a new malware was discovered by some researchers. Known as Morcut or Crisis, this malware arrives in a file named...

Facebook expands Bug Bounty program

07/26/2012, Remember Facebook’s Bug Bounty program, which was launched last year to reward researchers who find holes in the social network? Well, Facebook announced today that it will be expanding the scope of its Bug Bounty program. Not only are researchers...

NFC-enabled Android and Nokia phones vulnerable to hijacking

07/25/2012, Thought NFC is a relatively unused feature in this side of the world, there is no reason for it to be left as it is. As proven by a smartphone hacker named Charlie Miller. The hacker recently found a way to take advantage of the NFC capabilities of the...

Apple to make its first appearance at Black Hat 2012

07/24/2012, Cool things are indeed happening right now at the Black Hat 2012 conference in Las Vegas. But soon things will heat up, particularly this coming July 26, as Apple’s Platform Security Manager Dallas De Atley is scheduled to discuss key security...