GCHQ’s cryptanalysis code challenge cracked
The deadline on the apparent GCHQ code challenge, due to expire last night, has been extended by 24 hours.
More results...
The deadline on the apparent GCHQ code challenge, due to expire last night, has been extended by 24 hours.
Google+ has begun rolling out its “Find My Face” facial recognition feature for photos on the social networking site.
The information security market in the Central Asian nation of Azerbaijan is expected to grow 30% in 2012, according to US-based endpoint management and security firm Lumension.
Trade secrets are the most common intellectual property (IP) type stolen by malicious insiders, according to a new report by Symantec.
The holidays are a time for parties, presents, decorations, shopping, and – phishing! Here are some tips to avoid phishing scams.
A hacker who developed the Dingleberry tool to jailbreak the BlackBerry PlayBook tablet has issued a new version of the tool to circumvent a patch Research in Motion (RIM) issued this week to prevent it from working.
The European Network and Information Security Agency (ENISA) has released a new report designed to help improve the proactive detection of security incidents. It is the result of questioning a wide range of leading CERTs combined with ENISA’s own exper…
Institute of Electrical and Electronics Engineers’ (IEEE) experts have uncovered malware in more than 2,000 free smartphone applications. Free rogue applications are expected to be the most common access point for mobile hackers over the next year.
There has been a 90% increase in Android malware families in 2011 compared to 2010, while malicious iOS families only increased by 25%, according to FortiGuard Labs.
California’s Contra Costa County has informed around 4,700 residents that confidential information about debts they owed to the Health Services Department was posted online.