Is Your Mobile Device Hacker-Proof?

This is a guest post by Alyse.If it’s connected to the Internet, it can be hacked. For years, this was mainly a concern to PC users and IT guys, but anything that achieves mainstream usage and market share will eventually attract black hat types. From …

August 22, 2012
Read More >>

DDoS and the collateral damage of hacktivism

Hacktivism cuts both ways. The biter gets bit, and a war evolves. Where there is war, there are weapons. And where there are weapons, there is collateral damage. There is a hacktivist war around Julian Assange, between his detractors and his defenders …

August 22, 2012
Read More >>

Tesco to be investigated by the ICO

Tesco’s online security practices have been much questioned and criticized by security commentators over recent weeks. Now it appears that the Information Commissioners office is listening and acting, with reports that it will investigate.

August 21, 2012
Read More >>

r00tbeer strikes again – twice

Following yesterday’s news of hacks against AMD and TBN, hacking group r00tbeer security has struck again, twice – this time against Dutch electronics giant Philips and the UK’s Student Room.

August 21, 2012
Read More >>

Use iMessage rather than SMS, says Apple

Apple was responding to French iOS hacker pod2g’s announcement that he “found a flaw in iOS that [he considers] to be severe”, and that he is “pretty confident that other security researchers already know about this hole, and I fear some pirates as wel…

August 20, 2012
Read More >>