Discover a new way to find and share stories you'll love… Learn about Reading Desk

Post Profile

Inaccurate Copyright Enforcement: Questionable "best" practices and BitTorrent specification flaws

[Today we welcome my Princeton Computer Science colleague Mike Freedman. Mike's research areas include computer systems, network software, and security. He writes a technical blog about these topics at the Princeton S Network Systems -- required reading for serious systems geeks like me. -- Ed Felten] In the past few weeks, Ed has been writing about targeted and inaccurate copyright enforcement.
read more


German researchers discover a flaw that could let anyone listen to your cell calls.

Technology / Technology Industry News : Faster Forward (2 days ago)

German researchers have discovered security flaws that could let hackers, spies and criminals listen to private phone calls and intercept text messages on a potentially massive scale – even when cellular networks are using the most ... Read Post

Hackers Can Read Your Texts Thanks to Huge Security Flaw

Technology / Gadgets : Gizmodo (2 days ago)

The global telecom network Signal System 7 helps phone carriers across the world, including AT&T and Verizon, route calls and texts. It's also apparently perforated with security holes that lets hackers and spies listen to your call... Read Post

Windows Flaw Lets Malware Sneak Past Almost All Security Software

Technology : Switched: Computers (5 years ago)

Computers Researchers at Matousec have discovered a new and particularly worrisome flaw in the Windows ecosystem that allows malware to completely bypass security software. Anti-virus software works by standing between applications ... Read Post

Copyright © 2011 Regator, LLC