In response to the HTTPS-Only Standard proposal, the ACLU name 29 branches of the Federal government that don’t secure whistleblowers’ data.![]()
Tag Archives: Featured
If the “Deep Web” becomes searchable, is it still deep? 60 Sec Security [VIDEO]
Watch the latest episode of our only-takes-a-minute security roundup video! This week: From old crypto bugs to the latest Windows security holes…![]()
SSCC 194 – Patch early? Patch often? This time, “Patch NOW!” [PODCAST]
Join Sophos experts Chester Wisniewski and Paul Ducklin for the latest episode of our weekly security podcast. From the very latest Update Tuesday to how we get rid of 10-year-old security holes, here’s the security news you can use.![]()
Google fixes potential revenue-stealing “comment cloning” YouTube bug
Two Egyptian security researchers figured out how to clone other people’s YouTube comments. You could “borrow” approvals and positive reviews so that they appeared to promote your videos, too.![]()
WikiLeaks publishes massive searchable archive of hacked Sony documents
Julian Assange of the whistle-blowing site, WikiLeaks, says that Sony Pictures’ data should be publicly available due to its links with “geo-political conflict”.![]()
Could a hacker *really* bring down a plane from a mobile phone in seat 12C?
A recent document about Air Traffic Control from the US Government Accountability Office has caused quite a stir. Could a passenger get the plane to do a barrel roll without even turning off the in-flight movie?![]()
UN asks if robots should be allowed to kill humans
As military software becomes more mature and more powerful it is increasingly trusted to act autonomously, but there is one crucial decision that we’ve not yet ceded; the decision to end human lives.![]()
Target’s settlement with MasterCard costs retailer $19 million
Target says it reached a $19 million settlement with MasterCard to cover some of the damages to financial institutions after its December 2013 data breach. How much more is this breach going to cost?![]()
Tampering with US voting machine as easy as ‘abcde’, says Virginia report
All it would take to compromise it is to sit in the parking lot with a laptop, some free tools, and a dropper full of tech smarts.![]()
Practical IT: What you need to know about email encryption
When email was invented over 40 years ago, no one thought about how to ensure the integrity of messages. Here’s what you need to know about securing email with the right kind of encryption.![]()
