Tag: security

Powered by TechAbout

72 Stories

American drone weapons consoles infected with keystroke-logging virus

American drone weapons consoles infected with keystroke-logging virus

US Predator and Reaper drones in Afghanistan were hacked and a virus inserted into their remote cockpits at Creech Air...

Links on Facebook to be screened for viruses

Links on Facebook to be screened for viruses

Phishers and hackers have found that social media is a great place to plant links to malicious websites as unsuspecting...

Warning: MySQL.com was hacked, serves extremely malicious malware

Warning: MySQL.com was hacked, serves extremely malicious malware

With over 12 million monthly visitors, word must get out to keep people from going to MySQL(dot)com until they get...

Standing behind your product, one bullet at a time

Standing behind your product, one bullet at a time

With wars and battle zones popping up across the world, the security and defense industries have been booming over the...

The mobile malware menace

The mobile malware menace

As mobile technology continues to become more prevalent in use and present in our hands, so too do the "bad...

How to make a strong password

How to make a strong password

  They are the keys we use to get to some of the most important parts of our online lives....

The truth about passwords

The truth about passwords

The science behind hacking passwords has evolved much faster than the passwords themselves. While many websites and programs set limits...

The social network security test

The social network security test

Security is always a concern online, but on social networks it's doubly so as we put more and more personal...

10 tips to keep your family safe online

10 tips to keep your family safe online

Safety has been a concern online since kids started showing their parents how to surf. Now, as adults are realizing...

Big names top list for insecure data storage on apps

Big names top list for insecure data storage on apps

App watchdog group ViaForensics has been running popular Android and iPhone apps through their system to see who is encrypting...

Hackers take credit for Playstation network attack, claim possession of credit card data

Hackers take credit for Playstation network attack, claim possession of credit card data

If you're an active Sony Playstation network user, you're aware that it was "game over" last week as hackers made...

Navigating the Minefield: Facebook Settings

Navigating the Minefield: Facebook Settings

Facebook. If you have an internet connection and a pulse there's a good chance that you have an account. If...

Twitter Pushes https, Plans to Make it Default

Twitter Pushes https, Plans to Make it Default

With security being a major concern for Twitter over the years, they have been continuously making improvements and securing internal...

We’ve Isolated the Problem

We’ve Isolated the Problem

Infections of various types are normally the cause of computer problems. It could be malware, worms, viruses, or any number...

The Google 2-Step: Security, Squared

The Google 2-Step: Security, Squared

With online security filling the news, even becoming a government issue with the National Internet ID on the horizon, Google...

Justice! Sony Do Something Evil, Pwn Themselves

Justice! Sony Do Something Evil, Pwn Themselves

Oh, Sony. The venerable old company - who have actually done some smart things lately - have gone and shot...

How We Are Tracked Online

How We Are Tracked Online

The news is jam-packed with stories about online privacy, "do not track," and Internet security issues. With proposals for a...

The Most Dangerous Website in 2010: Google

The Most Dangerous Website in 2010: Google

According to the security gurus Trend Micro, the most dangerous site on the net in 2010 was none other than...

UK Teens Buy Their Own Songs 6000 Times, Make Almost A Million Bucks

UK Teens Buy Their Own Songs 6000 Times, Make Almost A Million Bucks

Say what you will about these kids' moral characters, but this is kind of clever. Uploading music to the iTunes...

Ben the Bodyguard Cruises Onto the Scene with One Heck of a Brilliant Website

Ben the Bodyguard Cruises Onto the Scene with One Heck of a Brilliant Website

Apparently, Ben the Bodyguard is some sort of data-security app. The truth is, after a quick Google, there's excruciatingly little...