GoDaddy
Web hosting giant GoDaddy has completed its investigation of the outage on Monday that crippled its site as well as hundreds of thousands that it hosts, and the company has concluded it was not the result of an external attack. This after a member of the hacktivist group Anonymous claimed responsibility on Twitter yesterday, saying Continue Reading →
BlueToad
A digital publishing company named BlueToad has come forward to take responsibility for the leak of a million iOS unique device identifiers (UDIDs) that were previously attributed to an alleged FBI laptop hack. In a number of interviews published Monday, BlueToad apologized to the public for the incident, explaining that hackers had broken into the Continue Reading →
Emma Watson
The American internet security firm McAfee said that the Harry Potter actress is the ‘most dangerous’ celebrity to search for online. Many sites use Watson to trick users into downloading malicious software or to steal personal information. When searching for the 22 year-old Watson there is a one-in-eight chance of landing on a malicious site. Cyber Continue Reading →
FBI
The computer revolution arrived late at the FBI, which was still collecting and matching fingerprints in 1999 in much the same way that it did when the agency first began collecting the images in 1924. But that’s been changing lately and privacy hawks are watching closely. As the millennium neared, the agency finally traded in Continue Reading →
Old Smartphones
In an age when sharing information is effortless, people still want to keep personal data private, according to a new report from the Pew Research Center. In examining how cell phone users manage their mobile data, Pew found that smartphone users are more likely than basic cell phone users to focus on data protection. Those Continue Reading →
Cloud Computing
For executives who have long relied on traditional data servers without issue, switching to the cloud can seem like an unnecessary risk. After all, the imagery evoked — a fluffy, floating entity far from your control —doesn’t exactly scream security. Truth be told, the vast majority of concerns about cloud computing are groundless; like most Continue Reading →
Protector Suite
Fingerprint-reading software preinstalled on laptops sold by Dell, Sony, and at least 14 other PC makers contains a serious weakness that makes it trivial for hackers with physical control of the machine to quickly recover account passwords, security researchers said. The UPEK Protector Suite, which was acquired by Melbourne, Florida-based Authentec two years ago, is Continue Reading →
Al-Jazeera Hacked
There are hacks, and then there are hacks. After Tuesday morning’s apparent Apple UDID dump, Al-Jazeera’s English website has been defaced in about the most conspicuous way possible. But who’s responsible? Clearly someone with a bone to pick with Al-Jazeera. But who is this Al-Rashedon? An opponent of Al-Jazeera’s coverage of Syrian civil war? The Continue Reading →