Computer Security Newswire (Page 2)

Comprehensive Real-Time News Feed for Computer Security. (Page 2)

Results 21 - 40 of 16,136 in Computer Security

  1. Defense Contractors: Cyber SuccessRead the original story w/Photo

    23 hrs ago | NewsFactor

    After a year that saw destructive cyberattacks on major U.S. companies, President Obama's call to stiffen America's In his State of the Union address Tuesday, Obama urged Congress to pass legislation to help battle the cyber spies, thieves and saboteurs who have wreaked havoc at major U.S. financial institutions, communications companies, retail chains and other civilian companies and infrastructure. The proposed bill would enhance information sharing between government and the private sector.

    Comment?

  2. Tinder ReviewRead the original story

    Yesterday | Examiner.com

    This app has taken online dating to a whole new level. This app is called Tinder .

    Comment?

  3. Digital Doomsday Coming?Read the original story w/Photo

    Yesterday | 4 Hoteliers

    Having heard about the hacking of personal bank records from numerous sites, including Home Depot, JP Morgan Chase, and Target, one could not fail to be concerned; Even the website Snapchat was the victim of cyber attack: All told over the past 12 months, hackers have stolen more than 500 million financial records. We are very vulnerable.

    Comment?

  4. Prelert's Anomaly Detective: Finding Black Swans in Big DataRead the original story w/Photo

    Saturday | Network World

    Anomalies are easy to find when they're big and frequent but what do you do when they're small and rare? Think about your systems and services a what is normal behavior for them? You can probably characterize normal for, say, a network backbone carrying some mix of traffic with a bandwidth utilization between X and Y and so on. But now consider the opposite problem: What is abnormal? Abnormal conditions can sometimes be easily detected, for example, if bandwidth utilization goes to 100% and stays there or SMTP traffic doubles.

    Comment?

  5. Don't forget, 'The Interview' is now available on NetflixRead the original story w/Photo

    Saturday | AfterDawn.com

    As a reminder, if you are a Netflix subscriber and haven't yet seen the now infamous 'The Interview,' it is available to stream starting today. The company did not discuss the terms of the deal, but it certainly marks the quickest time in which a major motion picture has been made available via the streaming service.

    Comment?

  6. ger of the Week: Barrett BrownRead the original story w/Photo

    Saturday | Truthdig

    Every week the Truthdig editorial staff selects a Truthdigger of the Week, a group or person worthy of recognition for speaking truth to power, breaking the story or blowing the whistle. It is not a lifetime achievement award.

    Comment?

  7. a Google leaves most Android users exposed to hackersRead the original story w/Photo

    Saturday | CNET News.com

    An executive confirms Google has no plans to fix a security hole in the default browser for older versions of Android, which are relied on by around 60 percent of all Android users. People using phones and tablets running Android 4.3 Jelly Bean or older will be left exposed to a security flaw in the default, unbranded browser app.

    Comment?

  8. Hacking of websites: Ghana, Turkey collaborate to expose culpritsRead the original story w/Photo

    Saturday | Ghanamma.com

    The Turkish government has expressed concern about the recent hacking of 11 websites of the Government of Ghana and called for collaboration to fight cyber crime. Turkish Ambassador to Ghana, Ms Nesrin Bayazit, said the sad event was indicative of the need for the two countries to work towards ensuring cyber security.

    Comment?

  9. thing tank From #Deflategate to Madonna's hackerRead the original story w/Photo

    Saturday | Boston.com

    If it's a trend, a clip, a comment, a moment, a meme, a tag, or a topic, it's a thing. Thing Tank is a review of the week in things, and rates them either up or down.

    Comment?

  10. City looking to be ahead of game on cyber threatsRead the original story w/Photo

    Friday Jan 23 | Fort Morgan Times

    As surprising as it may sound, Fort Morgan recently found a place at the center of discussions of cybersecurity and preventing cyber terrorism. "I didn't think I would ever be in a situation where I would talk about cybersecurity," Mayor Terry McAlister said, kicking off the event.

    Comment?

  11. Certificates to DB and BackRead the original story w/Photo

    Feb 27, 2011 | The Code Project

    In today's applications, the use of web services is constantly growing. In the web services panorama, there are different ways of managing the authentications.

    Comment?

  12. Yankees GM Brian Cashman Sued for Spying on E-Mails, Trying to Commit MistressRead the original story

    Saturday | Sports Media 101

    Yankees 101 provides 24/7 obsessive sports coverage of the New York Yankees as a part of Sports Media 101 . For news, op/ed, game reviews, team updates and even rumors you will find all of it on Yankees 101.

    Comment?

  13. Elizabeth City man recounts role in hacking investigationRead the original story

    Saturday | Rocky Mount Telegram

    In 1983, 17-year old Neal Patrick sat before a senate science subcommittee to talk about computer safety. Patrick had been one of a number of teens in Milwaukee, Wisconsin, who had hacked into dozens of high-profile computers that summer.

    Comment?

  14. PCMag Digital Edition: The Real Dark WebRead the original story w/Photo

    Saturday | PC Magazine

    The real dark underbelly of the Internet is more exciting than what you see in the movies - and much more terrifying. I had high hopes for Blackhat , Hollywood's latest attempt to turn the fascinating world of computer crime into a drama for mainstream audiences.

    Comment?

  15. Creating an almost unhackable passwordRead the original story

    Saturday | Examiner.com

    Don't lie about it. You, unless you are a member of anonymous , or the Kevin Mitnick , you have been hacked.

    Comment?

  16. Don't Believe These 6 Mobile Security MythsRead the original story w/Photo

    Saturday | Examiner.com

    Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket .

    Comment?

  17. Don't Believe These 6 Mobile Security Myths - community blog from Robert SicilianoRead the original story w/Photo

    Saturday | Finextra Research news

    Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket .

    Comment?

  18. UN pledges support for Nigeria's counter-terrorism effortsRead the original story w/Photo

    Saturday | Vanguard

    Dr Mohammed Chambas, the Special Representative of the UN Secretary-General for West Africa, has pledged the organisation's support for on-going counter-terrorism campaign in Nigeria. The pledge is contained in a statement issued by Lt.-Cdr.

    Comment?

  19. Five New Year's resolutions for your computerRead the original story w/Photo

    Saturday | USA Today

    I love spending money when it's not necessary -- said no one ever. Problem is, your computer might be showing its age, be it slow boot-up times, sluggish performance, annoying freeze-ups and pop-up windows Five New Year's resolutions for your computer I love spending money when it's not necessary -- said no one ever.

    Comment?

  20. Are these the most enormous horses youa ve ever seen? [PICTURES]Read the original story w/Photo

    Saturday | Horse and Hound

    Once you've met this bunch of friendly giants you'll be in no doubt that bigger really is better. Let's hear it for the equine BFGs! "Here is Monty my BFG - better known as 'The magnificent Monty' - who came all the way from Manchester to the Outer Hebrides.

    Comment?