Kevin Fogarty | March 7, 2014
Researchers dissecting rootkit find 100+ modules, shocking stealth, attacks on EU government and armies.
Kevin Fogarty | March 6, 2014
New anti-Putin hacktivist group cracks Russian arms-export firm, posts (infected) 500MB of documents and passports.
A host of patent applications shows Apple’s effort to make iDevices into better media-control hubs and emergency robo-beacons.
Kevin Fogarty | March 5, 2014
Both sides use the Internet well, but can’t attack “real things” from cyberspace.
CIO Beth Jacobs, credited with updating Target’s Web, mobile and POS, took the fall for Target’s massive data breach.
Kevin Fogarty | March 4, 2014
Uroburos, a 3-year-old (and adaptable) spy tool, may already have been upgraded.
Department of Justice accuses Sprint of overcharging Feds by 58 percent for court-ordered wiretaps.
Kevin Fogarty | March 3, 2014
Hackers are using the poor security on home routers to launch large-scale attacks on consumers, according to security firm Team Cymru.
Competitor sues to keep leading coffee-pod maker Keurig from adding tech that will block unlicensed coffee pods from its machines.
Kevin Fogarty | February 28, 2014
The Secret Service is investigating warnings that Sears was attacked using techniques similar to those that brought down Target.
Google opened its maps engine to outside organizations wanting to use “dry” data to illustrate compelling pictures of the present or past.
Kevin Fogarty | February 27, 2014
According to Pew’s survey, 42 percent of Americans had never heard of the Internet in 1995. Now 87 percent use it frequently.
Identity theft continues to top consumer complaints, but the fraud that accompanies it is happening in many more ways than in the past.
Kevin Fogarty | February 26, 2014
A secure Android phone codenamed “Black,” aimed at defense and intelligence workers, will destroy its data if necessary.
A pair of new tools from university researchers are designed to fill in searches or code that humans fail to finish on their own.
Kevin Fogarty | February 25, 2014
A lab-created proof-of-concept virus proves it’s possible for malware to attack whole networks rather than one PC at a time.
In a keynote of a conference nearly sunk by controversy over RSA’s involvement with the NSA, RSA chief Art Coviello offered little to opponents.
Kevin Fogarty | February 24, 2014
Microsoft’s EMET zero-day exploit prevention app stops many attacks, but is easily bypassed by attackers able to adapt to its protections.
The new SGP Technologies Blackphone is designed to be easy to use, without storing precious metadata.
Kevin Fogarty | February 21, 2014
New study shows taking a walk without leaving your desk could make you 10 percent more productive and a lot more healthy.
Free calls over WiFi networks would be great if the restrictions were less onerous; an LTE-4G gateway could cut costs.
Kevin Fogarty | February 20, 2014
So many mobile apps show so many security flaws (an average of 13 each) that it’s much quicker to count the few that are secured.
For the first time in the U.S., consumers can buy cryptcurrency in the real world, under the same rules required for any other ATM.
Kevin Fogarty | February 19, 2014
Google invites nine cities to compete for the next open slot on its Gigabit Ethernet service list.
FCC chairman Tom Wheeler will take court’s invitation to re-create Open Internet regulations, a plan that already faces opposition from Republican FCC commissioners.
Time sucked into Netflix or similar, weekly:
Read the 145 comments Voted on 13118 times.