All Blogs / Technology / Security / Popular


CISA Cybersecurity Bill Advances Despite Privacy Concerns

Privacy critics have protested that CISA would create a legal framework for companies to more closely monitor internet users and share that data with government agencies. The post CISA Cybersecurity Bill Advances Despite Privacy Concerns appeared first on WIRED.

Former Sr. Pentagon Official Labels Sony as a Cyberwar Conflict

"Obama Needs A Cyberwar Cabinet" by Todd Rosenblum is one of the worst opinion pieces that I've read in a long time. Rosenblum has a long history in government service (DoD, DHS, Senate Staffer) and just left three months ago to start...Show More Summary

German Police Just Made a Gigantic Dark-Web Drug Bust

German police have seized more than a third of a ton of narcotics from a single online drug seller. The post German Police Just Made a Gigantic Dark-Web Drug Bust appeared first on WIRED.

Obama administration wants greater powers to take down botnets

In an effort to crack down on hijacked computers and networks, the Obama administration is seeking expanded powers through an amendment to existing law.

Panda antivirus mistakenly flags itself as malware, bricks PCs

For now, Panda warns users not to restart -- in case you can't get running again.

Samsung security: How long is 'too long' to patch?

A vulnerability in Samsung mobile devices which placed social networking accounts has been patched -- finally.

Here’s How the US Should Fight ISIS With Social Media

Here are a few strategies the U.S. can use to combat ISIS. Like any strategy in counterinsurgency, none is a panacea, but all have advantages worth considering. The post Here’s How the US Should Fight ISIS With Social Media appeared first on WIRED.

EquationDrug: Sophisticated, stealthy data theft for over a decade

Far beyond the capabilities of traditional cybercriminals, The Equation Group's EquationDrug platform is used to target select victims worldwide.

The Divergent Series Apparently Isn't Getting Much Better

Is teen dystopia on the way out? Film Divergent Insurgent The Hunger Games Battle Royale

Avengers Age of Ultron Box Office Predictions

In a word, huge Film The Avengers Avengers: Age of Ultron Star Wars The Force Awakens

New Star Wars Books to Hit the Market

Twenty-five titles in all Trending Star Wars The Force Unleashed

BrickHouse Security Welcomes Securus GPS Tracking Customers Beginning March 16

Following the acquisition of Securus, Inc.’s GPS tracking business, BrickHouse Security will be transitioning all Securus customers to its world-class GPS platform beginning March 16. Included in the acquisition are the popular Securus brands eZoom and Zoombak GPS trackers. Show More Summary

Ten tips to avoid identity theft

Follow these simple tips to make protecting your identity easier.

Lax Wordpress security, data protection caused by lack of education

New research suggests a lack of knowledge is causing entirely preventable security problems.

Dropbox patches Android security flaw

The cloud storage provider has fixed a security issue which allowed hackers to capture data through compromised third-party apps.

Tim Burton's Dumbo

Doesn't sound like a good idea... Film Tim Burton Dumbo Beetlejuice Transformers

Hillary Clinton Says Her Email Was Secure; She Can’t Know

Hillary Clinton says that there was no security breach on her private clintonemail.com server. One problem: there's no way she can know that. The post Hillary Clinton Says Her Email Was Secure; She Can’t Know appeared first on WIRED...

CIA secretly helped build phone scanning tech for US operations

The new report furthers allegations that US law enforcement are increasingly relying on intelligence agencies for help, despite rules protecting domestic intelligence operations.

Report: CIA Has Tried for Years to Break Into Apple Gear

The CIA has been researching ways to hack into Apple's technology since long before we all carried Apple devices around in our pockets. The post Report: CIA Has Tried for Years to Break Into Apple Gear appeared first on WIRED.

Googlers’ Epic Hack Exploits How Memory Leaks Electricity

Google's hack shows a fundamental flaw in basic computer hardware that could be impossible to fully patch in existing vulnerable computers. The post Googlers’ Epic Hack Exploits How Memory Leaks Electricity appeared first on WIRED.

Copyright © 2015 Regator, LLC