Blog Posts Tagged with "Google"


Hijacked GOV and EDU Websites Serving Up SPAM

January 17, 2011 Added by:Headlines

The websites of some of the country's biggest universities, as well as several government administered sites, have been compromised and are redirecting visitors to SPAM ads. Sections of the websites contain redirected links to spoofed Google searches for fake online stores peddling everything from software to pharmaceuticals...

Comments  (0)


Today’s Nonsense – The Cloud as a Government Plot

January 16, 2011 Added by:Ben Kepes

Douglass talks about the security of the Cloud and justifiably contrasts security with privacy. Contrasting these two aspects of the Cloud however does not give one the right to jump to the conclusion that private information will somehow be available to Government and non-Government agencies...

Comments  (0)


Charges Pending Against Google in WiFi Sniffing Case

January 14, 2011 Added by:Headlines

"While we have repeatedly acknowledged that the collection of payload data was a mistake, we are disappointed with this announcement as we believe Google Inc. and its employee did nothing illegal in Korea," Google Korea spokesman Ross LaJeunesses said...

Comments  (0)


Know What You Are Doing When You Copy Code

January 11, 2011 Added by:Rod MacPherson

Back in early May 2000 when the ILOVEYOU worm broke out, I, like many other employees at ISPs around the world scrambled to get something in place to stop the spread of it as it began to bring mail servers to a crawl and fill disk space with copies of itself...

Comments  (1)


When Computers Watch Us, Who Watches Them?

January 10, 2011 Added by:Theresa Payton

When security guards use surveillance TVs they apply acumen, logic, intuition and skill. Computers use face recognition software and behavior patterns. This has far reaching opportunities to improve lives but potentially at the cost of your privacy. That does not mean I am opposed to it...

Comments  (0)


Password Database Dumped to Pirate Bay Bit-Torrent Site

January 08, 2011 Added by:Dan Dieterle

The embroiled Pirate Bay, when not dealing with legal issues, has had their own run in with hackers. Last summer, a hacker broke into their systems through a SQL vulnerability and stole 4 million users passwords...

Comments  (0)


DOJ Gets Subpoenas for WikiLeaks Twitter Accounts

January 08, 2011 Added by:Headlines

The DOJ requested subpoenas to access the Twitter accounts of WikiLeaks and several supporters in an ongoing criminal investigation of the whistleblower organization. The information sought includes residential, email and IP addresses, session times, billing records, and bank account details...

Comments  (0)


Americans Waking Up to Social Media Privacy

January 07, 2011 Added by:Robert Siciliano

It is evident that without some type of government oversight that the “self policing” done by all those who stand to gain financially by selling our data will continue to spin out of control to the point where privacy will be something of the past...

Comments  (0)


Google Street View Illegally Harvests WiFi Data - Again

January 06, 2011 Added by:Headlines

An official with the National Police Agency said that decrypted hard drives seized from Google last year contained private emails and text messages harvested by their Street View survey vehicles. South Korean police said they plan to file criminal charges...

Comments  (3)


Online Privacy: Fighting for Your Eyeballs

January 06, 2011 Added by:Robert Siciliano

Most major websites now install cookies on your computer, which track what you do online. Over time, these cookies develop a profile, which becomes your digital fingerprint, to a certain extent. Microsoft, Google, Facebook, and most major newspapers, retailers, and advertisers are in on the game...

Comments  (0)


Google and Microsoft Clash Over IE Fuzzer Release

January 04, 2011 Added by:Headlines

Did a Google staff researcher jump the gun by releasing a tool that identifies dozens of exploitable bugs in Internet Explorer before critical patches were available, or did Microsoft drop the ball back in July by not addressing the problems when first presented to them? A cyber-drama is playing out...

Comments  (0)


Ten Big Information Security Stories from 2010

January 02, 2011 Added by:Headlines

The ensemble does not focus solely on the pop-security issues that made the biggest headlines per se, but is instead a thoughtful examination of some of the stories that will prove to have the biggest impact and long term effects on the information security field as a whole...

Comments  (0)


Top Ten Threats to Your Privacy in 2010

December 29, 2010 Added by:Headlines

Some of the threats came from the usual suspects: criminal syndicates, hackers and all-around cyber miscreants. Other threats emanated from the activities of legitimate industry giants and even government agencies, reinforcing the fact that consumer privacy is under attack on multiple fronts...

Comments  (0)


Top Ten Security Events of 2010

December 27, 2010 Added by:Headlines

2010 has proved to be a most eventful year for the information security field. From the WikiLeaks "Cablegate" disclosures to Chinese state-sponsored hacking, the Stuxnet virus to Google's WIFI intrusions, 2010 will certainly be remembered as a benchmark year.

Comments  (0)


Mobile Providers Must Tap Customer Knowledge

December 25, 2010 Added by:Rahul Neel Mani

Mobile services providers need to build on their intimate knowledge of their customers to differentiate themselves and create compelling, affordable packages, or risk losing customers and revenue...

Comments  (0)


Analysis: Flash Player in a Chrome Sandbox

December 22, 2010 Added by:Rafal Los

The problems Adobe has had lately keeping itself off the 0-day list week after week doesn't bode well for the trust that browser makers have in the product... and apparently Google Chrome is the first to come out and drop Flash player right into a sandbox...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »