All Blogs / Technology / Security / Popular


The NSA may not be listening to your private phone calls, but it has been watching your private parts

Tapping into laptop webcams shows the biggest and most blatant lack of respect for people's privacy by Western governments -- probably in living memory.

On John Oliver, Edward Snowden Says Keep Taking Dick Pics

"The good news is, there is no [government] program named The Dick Pic Program," said Edward Snowden. "The bad news is they are still collecting everybody's information, including your dick pics." The post On John Oliver, Edward Snowden Says Keep Taking Dick Pics appeared first on WIRED.

Bill to Ban Undetectable 3-D Printed Guns Is Coming Back

In the next few months, Congressman Steve Israel plans to reintroduce legislation that would ban 3-D printed guns or any other fully-plastic firearm. The post Bill to Ban Undetectable 3-D Printed Guns Is Coming Back appeared first on WIRED.

After Obama's cybersecurity order threatens Snowden fund, bitcoin donations spike

A new executive order is said to have made it illegal to donate to Edward Snowden's fund, which didn't go down so well with one good-spirited community.

Zero Day Weekly: Cyber national emergency, GitHub and Slack nailed, Android malware less than 1 percent

A collection of notable security news items for the week ending April 3, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.

Invizbox (hands-on): Another flawed Tor "privacy" router debuts

The Tor router runs on the same hardware as the failed Anonabox project, but with a more "honest" approach. The trouble is: honesty won't keep your Internet activity private.

Batman Vs Superman First Trailer to Debut in May

First footage to finally be unveiled Film batman vs superman ben affleck Mad Max Fury Road

Silk Road Boss’ First Murder Attempt Was His Mentor’s Idea

The allegation that the Silk Road’s Dread Pirate Roberts attempted to pay for six murders has loomed over the story of that massive online drug market. How could the pseudonymous figure preaching non-violent, libertarian ideals stoop...Show More Summary

New Obama Order Allows Sanctions Against Foreign Hackers

The order is aimed primarily at state-sponsored actors and other hackers who are beyond the reach of law enforcement or diplomatic efforts. The post New Obama Order Allows Sanctions Against Foreign Hackers appeared first on WIRED.

Monthly Blog Round-Up – March 2015

Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “Why No Open Source SIEM, EVER?” contains some of my SIEM thinking from 2009. Is it relevant now? Well, you be the judge. Current emergence of open source log search tools, BTW, does not break the logic of that post. Show More Summary

GitHub 1, China 0, as sustained cyberattack ends after five days

The code-sharing website is back up and running after a week-long attack crippled its services. The attack was blamed on Beijing, an allegation it didn't actually deny.

YouTube fixes bug that could've allowed hacker to delete any video

The security researcher sadly did not wipe out years of videos by Justin Bieber, leaving the world in the horrid, uncultured state that it is.

US military trialling Blackphone devices, despite FBI's renewed anti-encryption rhetoric

The top-of-the-line Blackphones are said to be "NSA-proof," despite the FBI's new policy that demonizes encryption as a "huge problem" for law enforcement.

Hugh Jackman Will Stop Playing Wolverine in 2017

The actor will leave his best known role in the next Wolverine solo film  Film Hugh Jackman Wolverine X-Men X-Men Apocaylpse

Andy Serkis is Indeed in Avengers Age of Ultron

Why not? Film Andy Serkis Avengers Age of Ultron Star Wars The Force Awakens

Reconnaissance malware wave strikes energy sector

Symantec says a new Trojan-based campaign, focused on the Middle East, is targeting the energy industry and its trade secrets.

DDoS attacks costs enterprise £100,000 per hour, study finds

DDoS attacks are not only a disruption but can also cost businesses dearly, according to Neustar research.

Cyber Threat Intelligence: More Threat Than Intelligence?

This article proposes that commercial cyber intelligence products have multiple flaws which make it unreliable for use by the U.S. government, and that it falls upon the government to address those flaws in the following ways: Examine cyber threat intelligence for indicators of deception. Show More Summary

Hillary Clinton erases history…maybe

There has been a lot of talk about Hillary Clinton’s missing emails. After turning over thousands of emails, Clinton wiped the hard drive on her personal server. Mobile Hillary Clinton emails wiping

DEA Agent Charged With Acting As A Paid Mole for Silk Road

Nearly 18 months after the Silk Road online drug market was busted by law enforcement, the criminal charges rippling out from the case have now come full circle: back to two of the law enforcement agents involved in the investigation,...Show More Summary

Copyright © 2015 Regator, LLC