|
Judge tosses BC "hacker" search warrant
Investigators must return student's possessions after the court finds that Boston College police did not give adequate evidence of a crime. 2009-05-25 Read more ... | Comment(s) | Post Comment Grumblar drive-by download attacks surge The malicious threat compromises Web sites and then uses the infected sites to spread malware, warns security firms and the US-CERT. 2009-05-22 Read more ... | Comment(s) | Post Comment Adobe moves to quarterly patch schedule Following criticism from security researchers for its slow response to serious vulnerabilities, Adobe commits to a quarterly patch schedule. 2009-05-21 Read more ... | Comment(s) | Post Comment Much ado about Kylin The Kylin operating system, a Chinese version of FreeBSD, gets a flash of media attention after a consultant calls it a danger to U.S. cyber capabilities. 2009-05-18 Read more ... | Comment(s) | Post Comment Financial districts a wireless hacker's paradise One security firm scans the wireless networks accessible in the financial centers of seven cities and finds the majority of access points have easy-to-break or nonexistent security. 2009-05-13 Read more ... | Comment(s) | Post Comment PowerPoint gets hefty fix, Apple inundates Microsoft releases a single, massive update for its presentation software, while Apple closes at least 70 flaws the same day. 2009-05-13 Read more ... | Comment(s) | Post Comment Cyber attack could bring U.S. military response The United States could respond to an online attack on critical systems with a more conventional military attack, says an Air Force general. 2009-05-11 Read more ... | Comment(s) | Post Comment Hackers steal UC Berkeley health records The University of California at Berkeley warns students and alumni that online thieves infiltrated restricted servers and stole more than 160,000 medical records, including health insurance information and Social Security numbers. 2009-05-11 Read more ... | Comment(s) | Post Comment Air traffic systems vulnerable, IG states An audit of the Web applications used to support air traffic control systems finds hundreds of vulnerabilities and documents 150 incidents still unresolved, according to the DOT's Inspector General. 2009-05-08 Read more ... | Comment(s) | Post Comment Freeze turns phones into passwords Walk away from your computer and it will lock automatically, if you install new software from BIOS maker Phoenix Technologies. 2009-05-07 Read more ... | Comment(s) | Post Comment |
|
Privacy Statement |