Tech News    

    White on black version     Black on white version
2015-05-24: Miami Dade College students face felony records, prison in tax fraud scheme
2015-05-24: Half Of Retail, Healthcare Sites 'Always Vulnerable'
2015-05-24: Margaret Hamilton, lead software engineer of the Apollo project -- USEFUL HISTORICAL PICTURE
2015-05-24: Can Mozilla Halt Firefox's Slide and Break Up the Mobile Internet Duopoly?
2015-05-24: Vulnerability Disclosure Deja Vu: Prosecute Crime Not Research

2015-05-23: Chase thinks it's very suspicious that I am attending LayerOne
2015-05-23: Delta Air Lines HTTPS login button on the bottom of an HTTP page, Tsk, Tsk
2015-05-23: Paranoid defence controls could criminalise teaching encryption in AU
2015-05-23: Meet 'Tox': Ransomware for the Rest of Us
2015-05-23: Hacking Starbucks for unlimited coffee -- INTERESTING DISCLOSURE CASE
2015-05-23: New Hampshire bans drones for hunting
2015-05-23: The truth about Android updates
2015-05-23: FBI FBI Releases New Version of Child ID App

2015-05-22: eBay Fixes Reflected File Download Flaw
2015-05-22: Free Ransomware Decryption and Malware Removal ToolKit
2015-05-22: Quiz: Just how Kafkaesque is the court that oversees NSA spying?
2015-05-22: Flawed Android Factory Reset Allows Recovery of Sensitive Data: Researchers -- USEFUL FOR LECTURES
2015-05-22: Security Questions Don't Offer as Much Protection as Web Users May Hope: Research
2015-05-22: More Rounds, Less Security?
2015-05-22: Federal judge locks up alleged NullCrew hacker
2015-05-22: How Long Does it Take for your App to be Approved? Google: 2 hrs., Apple: 4-6 days (from 2014)
2015-05-22: AdultFriendFinder dating website hack exposes users' intimate details
2015-05-22: Uber CEO Would Replace Drivers With Self-Driving Cars
2015-05-22: Orrin Hatch on Trade Bill: 'I Don't Know Fully What's in TPP Myself'
2015-05-22: Report: $19M breach settlement between MasterCard, Target terminated
2015-05-22: The Internet Health Test
2015-05-22: Internet Health Test Checks to See if Your ISP Slows Your Connection
2015-05-22: Blue Cross Blue Shield of North Carolina HIPPA and COPPA Violations -- Fixed in 2 days!
2015-05-22: Thunderplains developer conference transmits confidential data in plaintext
2015-05-22: ThunderPlains developer conference

2015-05-22: Web Security Dojo 2.0 - Self-Contained Web Hacking Training

2015-05-21: Storm Kit - Changing the rules of the DDoS attack
2015-05-21: How Computer Crime Laws Silence Helpful Hackers

2015-05-21: $40 online Infosec classes from Joe Mccray -- RECOMMENDED

2015-05-20: Let's Encrypt: Automated SSL Certificate Generation
2015-05-20: placekitten -- USEFUL FOR PROJECTS :)
2015-05-20: I learned about PlaceKitten while doing a security audit of medical insurance apps :)
2015-05-20: When I see this, it's like waving a red flag in front of a bull
2015-05-20: NSA may need to begin winding down surveillance program this week
2015-05-20: is put out to pasture after retailer starts domain dispute
2015-05-20: mSpy Denies Breach, Even as Customers Confirm It
2015-05-20: %u201890s-style security flaw puts "millions" of routers at risk
2015-05-20: Logjam: How Diffie-Hellman Fails in Practice
2015-05-20: TLS Logjam - Testing for it and fixing it
2015-05-20: Why I had to unlearn lessons from my Asian-American upbringing
2015-05-20: Simple Website Flaw Exposed Data Of Charter Internet Customers
2015-05-20: Car Hackers Hit L.A. To Fight DMCA And Automotive Lobbyists
2015-05-20: Microsoft issues crash warning with latest Windows 10 update

2015-05-20: Amazon's cloud is ten times bigger than the next fourteen competitors combined

2015-05-19: Google Cloud Platform Blog: Introducing Preemptible VMs, a new class of compute available at 70% off standard pricing
2015-05-19: Address-Spoofing Bug Haunts Android Stock Browser

2015-05-19: St. Louis Federal Reserve Suffers DNS Breach

2015-05-19: How AT&T Is Virtualizing Security
2015-05-19: Some People Do More Than Text While Driving
2015-05-19: Trojanized Putty used to steal information
2015-05-19: Uber in hot water again this time over plaintext passwords in emails
2015-05-19: Chinese professors among 6 charged with economic espionage
2015-05-19: Format String Bug Exploration - USEFUL FOR PROJECT
2015-05-19: Key Collision Report is Wrong
2015-05-19: IBM Security Bulletin: Vulnerability in RC4 stream cipher affects IBM Notes, Domino & Expeditor (CVE-2015-2808)
2015-05-19: Phishing Report: Top 20 Targets--Apple is #1
2015-05-19: Researchers Break RSA 4096-Bit Keys by Key Collision, Caused by Insufficient Entropy
2015-05-19: USN-2603-1: Thunderbird vulnerabilities
2015-05-19: Safari URL Spoofing PoC -
2015-05-19: PoC for Safari URL Spoofing
2015-05-19: URL Spoofing in Safari Opens Door for Phishing Attacks
2015-05-19: Apple and Google plead with Obama to reject backdoor access to encrypted data
2015-05-19: Tech giants don't want Obama to give police access to encrypted phone data
2015-05-19: Flaw in IBM SPSS Statistics Puts Sensitive Data at Risk
2015-05-19: Dropbox wins international cloud security cert: ISO 27018
2015-05-19: Microsoft\'s VC3 security is encryption for the cloud
2015-05-19: CoinVault Authors Release New Ransomware
2015-05-19: Russian Sony PS4 crack offered by Brazil merchants
2015-05-19: FortaCloud Free VPS Servers -- VERY CHEAP, INTERESTING FOR PROJECTS
2015-05-19: IPsec Vulnerabilities--so much emotion the logic is hard to find
2015-05-19: Digital rights group slams Mark Zuckerberg\'s project for ˜exposing users to harm\'
2015-05-19: Vulnerability Note VU#177092 KCodes NetUSB kernel driver is vulnerable to buffer overflow
2015-05-19: AEADs: getting better at symmetric cryptography
2015-05-19: Suspended sentence for illegal decompilation of the Skype code
2015-05-18: 88% of Android Apps make cryptography errors (2013)
2015-05-18: Alternative Distribution Options | Android Developers -- USE IN TALKS
2015-05-17: Penn State University hacked by Chinese APT group
2015-05-17: Performance trumps security in old timey medicine -- USEFUL INFOGRAPHIC
2015-05-17: Humanity weeps as Candy Crush Saga comes preinstalled with Windows 10
2015-05-17: NowSecure App for Android devices
2015-05-17: Security researcher "hijacked plane in-flight": questions and answers

2015-05-16: Password Cracking Slides by IronGeek
2015-05-16: US special forces kill Isis commander and capture wife in Syria raid
2015-05-16: Gdbinit: user-friendly gdb configuration file -- GOOD FOR PROJECTS
2015-05-16: Hopper: The OS X and Linux Disassembler -- GOOD FOR PROJECTS
2015-05-16: Radare portable reversing framework -- USEFUL FOR PROJECTS
2015-05-16: Hong Kong Banks Hit By Bitcoin Ransom Demands

2015-05-15: United Airlines wants people to hack its websites, not its planes
2015-05-15: Hacking the Internet of Things
2015-05-15: New Flaws Identified in Lenovo's System Update Service
2015-05-15: Washington state passes law requiring warrant for 'stingray' use
2015-05-15: Young women spend five hours a week taking selfies, says survey
2015-05-15: John Dvorak Is Totally Wrong About Passwords
2015-05-15: VMware blasts bad backup bug in ESXi 6.0
2015-05-15: U.S. to Run Out of IPv4 Addresses This Summer
2015-05-15: Microsoft Security Intelligence Report (SIR) vol. 16
2015-05-15: Stephen Hawking predicts robot apocalypse coming within 100 years
2015-05-15: GW Cyber Academy | The George Washington University
2015-05-15: Reddit announces anti-harassment policy in attempt to curb cyberbullying
2015-05-15: Apple Watch, Android Wear Lack Theft Protection

2015-05-14: Registry fires back at ICANN over .SUCKS domain pricing criticism
2015-05-14: Read the NDA a Comcast customer was told to sign to get a $600 refund
2015-05-14: owner pleads guilty to training customers to beat polygraph
2015-05-14: Admissability of Polygraph Tests in Court
2015-05-14: Feds drop case in which cops nailed webcam to utility pole to spy on house
2015-05-14: Third blogger this year hacked to death in Bangladesh
2015-05-14: The big drug database in the sky: One firefighter's year-long legal nightmare
2015-05-14: Android and iOS apps on Windows: What is Microsoft doing and will it work?
2015-05-14: Google rejecting 59 percent of right-to-be-forgotten removal requests
2015-05-14: How to back up and restore your Apple Watch
2015-05-14: Look out, law abiding folk: UK's Counter-Extremism Bill slithers into view
2015-05-14: Windows 10 editions: Everything you need to know
2015-05-14: Policy tsarina Rachel 'baby GIF' Whetstone dumps Google for Uber
2015-05-14: PHOTON SPACE SAIL successfully Kickstarted into orbit
2015-05-14: NASA snaps first full family photo of Pluto and its five moons
2015-05-14: Strange: There will be NINE KINDS of Windows 10
2015-05-14: Magento RCE And Application Security Templates
2015-05-14: APT group's malware retrieved C&C IP addresses from Microsoft's TechNet portal
2015-05-14: FBI Hacker Hunt Goes 'Wild West'
2015-05-14: Command Injection, Other Flaws Found in Cisco TelePresence Products
2015-05-14: Apple Watch's security features protect data but won't deter theft
2015-05-14: Microsoft Ships Hyperlapse for Windows, Windows Phone and Android
2015-05-14: Azure gives AWS the blues again in Nasuni cloud storage poll
2015-05-14: Google blocks Chrome extensions not found in the official Web Store -- USE IN TALKS
2015-05-14: Walmart's testing a $50 Amazon Prime competitor
2015-05-14: House Passes USA Freedom Act to Curb NSA Spying
2015-05-14: What Passes for Excellence in Silicon Valley Housing
2015-05-14: Lax Security Opens the Door for Mass Scale Abuse of SOHO Routers
2015-05-14: Britain is too tolerant and should interfere more in people's lives, says David Cameron
2015-05-14: David Cameron to unveil new limits on extremists' activities in Queen's speech
2015-05-14: Oil & Gas Firms Hit By Cyberattacks That Forgo Malware
2015-05-14: The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
2015-05-14: DevOps: A Software Architect's Perspective (SEI Series in Software Engineering) eBook: Len Bass, Ingo Weber, Liming Zhu

2015-05-13: Android botnet spread through drive-by downloads (2014) ty @irfan_asrar
2015-05-13: Android Kitchen--make custom ROMs
2015-05-13: More fake antivirus programs found in Google Play, Windows Phone Store (2014) ty @irfan_asrar
2015-05-13: The relationship between DevOps and Security -- EXCELLENT INFOGRAPHIC
2015-05-13: Bitdefender's iOS privacy app yanked from the App Store (from 2012) ty @irfan_asrar
2015-05-13: Google Play Store has a Porn Problem, and it's Not Going Anywhere (from 2014) ty @irfan_asrar
2015-05-13: Politically-motivated mobile malware used to sabotage womens' rights campaign in the Middle East (2013)
2015-05-13: Could Sexy Space be the Birth of the SMS Botnet? (2009) ty @irfan_asrar
2015-05-13: IMPORTANT NOTICE QEMU "VENOM" Vulnerability - Rackspace
2015-05-13: Amazon, Rackspace, Red Hat jump on 'Venom' vulnerability
2015-05-13: Update on CVE-2015-3456, aka the VENOM Security Vulnerability | DigitalOcean
2015-05-13: Five Charged in Nationwide Identity Theft Scheme -- Tax Refunds
2015-05-13: Analbleed bug -- SHOW TO CLASS
2015-05-13: Full Disclosure: Multiple Vulnerabilities in Openlitespeed (= 1.3.10 - CVE-b045-73d a.k.a. Analbleed.
2015-05-13: Microsoft DreamSpark - Product Microsoft Azure for DreamSpark
2015-05-13: SecureLive Abandoned Security Product -- SHOW TO CLASS
2015-05-13: UK Introduced Life Sentences For Killer Hackers This Month. In Nigeria, It's The Death Penalty
2015-05-13: VENOM Vulnerability -- Authoritative page, with a logo & everything -- SHOW TO CLASS
2015-05-13: Why Bitcoin Matters <--Bitcoin is the biggest financial revolution since the Ponzi scheme
2015-05-13: Forensics of the Apple Watch
2015-05-13: ˜VENOM' Leaves Millions of Virtual Machines Vulnerable
2015-05-13: "Venom" virtual floppy controller vuln affects Xen & VirtualBox but not VMware or Hyper-V -- SHOW TO CLASS
2015-05-13: Who's Scanning Your Network? (A: Everyone)
2015-05-13: Kali Linux NetHunter for Nexus and OnePlus

2015-05-12: MVP Virtual Conference May 14-15; free for students
2015-05-12: Be Kind
2015-05-12: More Lenovo woes: 3 security flaws, website clerical errors, maybe layoffs
2015-05-12: Warrantless airport seizure of laptop "cannot be justified," judge rules
2015-05-12: AlienVault OSSIM, USM platform vulnerabilities exposed
2015-05-12: Russia and China seal cyber non-hack pact
2015-05-12: Pop-up pest MacKeeper patches 0-day remote code execution vuln
2015-05-12: New malicious Office docs trick
2015-05-12: Extreme community policing: West Virginia crook pepper-sprays HIMSELF mid-robbery
2015-05-12: For its next trick, Microsoft diminishes the iPad with just a driver
2015-05-12: $7500 DDoS extortion hitting Aussie, Kiwi enterprises
2015-05-12: Ex-NSA security bod fanboi: Apple Macs are wide open to malware
2015-05-12: NSA domestic dragnet NOT authorised by Patriot Act, rules US Appeals Court
2015-05-12: Red-faced Germans halt NSA cooperation after Euro spying revealed
2015-05-12: F*cking DLL! Avast false positive trashes Windows code libraries
2015-05-12: Are you an infosec bod? You must be STINKING RICH, says study
2015-05-12: Assembly x86 Emulator
2015-05-12: Verizon to Buy AOL for $4.4 Billion in Cash
2015-05-12: Amazon Echo: Five months in, it's the most used gadget in my home
2015-05-12: Lab of a Penetration Tester: Week of PowerShell Shells - Day 2 - UDP Shells
2015-05-12: Microsoft opens Skype Translator preview to all Windows 8.1, 10 users
2015-05-12: UK spy agency now hiring hackers to target terrorist networks

2015-05-11: Hackers target Starbucks mobile users, steal from linked credit cards without knowing account number
2015-05-11: Worker fired for disabling GPS app that tracked her 24 hours a day [Updated]
2015-05-11: News Digest App "NYT Now" Drops Subscription Pricing, Offers Brand Sponsorships Instead
2015-05-11: Square Open Source - HackerOne Bug Bounties
2015-05-11: 400: Another CO2 record high.
2015-05-11: Apple mobile devices still dominate at companies, but Windows, Android gain
2015-05-11: SSDs lose data if left without power for just 7 days
2015-05-11: JEDEC SSD Specifications Explained -- primary source about SSD data retention
2015-05-11: Stealthy Linux GPU malware can also hide in Windows PCs, maybe Macs
2015-05-11: What's the Point of a Professor?

2015-05-10: USB Wireless Network Adapter that works for cracking WEP ty @erikberlin
2015-05-10: Internet of Things World -- Free Passes -- May 12-13, San Francisco
2015-05-10: Google Play Books is a Safe Haven for Commercial eBook Piracy
2015-05-10: WordPress Sites Backdoored, Leaking Credentials
2015-05-10: Open Smart Grid Protocol Homegrown Crypto Weaknesses
2015-05-10: [ActionScript 3] CVE-2015-0314 Flash exploit PoC -- USE IN PROJECTS
2015-05-10: Mega Consults Legal Team Over New Piracy Report

2015-05-09: Yahoo sues former staffer for alleged leaks to writer
2015-05-09: Loki -- Scans for Indicators of Compromise, including NSA attacks
2015-05-09: So, the NSA Has an Actual Skynet Program
2015-05-09: Your cyberpunk games are dangerous
2015-05-09: Serious MacKeeper vulnerability found
2015-05-09: The 100 Best Android Apps of 2015 -- TARGET LIST
2015-05-09: World's first 6TB SSD will be available to buy in July
2015-05-09: A flaw in Realtek SDK exposes SOHO routers to the attack
2015-05-09: Iran's 'Smart' Instagram Censorship Isn't That Smart
2015-05-09: Two men cuffed, indicted over Photobucket password-protected pic plunder
2015-05-09: Free Tool Allows Anyone to View Facebook Users' Hidden Friends List
2015-05-09: Nearly 95% of SAP Systems Vulnerable to Hackers
2015-05-09: Man in the Middle Arp Spoofing using MitMF and BEEF -- USEFUL FOR PROJECTS
2015-05-09: The MANA Toolkit for rogue access point (evilAP) attacks -- GOOD FOR PROJECTS
2015-05-09: FruityWifi: open source tool to audit wireless networks

2015-05-07: SMAPPER/MimikatzHoneyToken -- USEFUL FOR PROJECTS
2015-05-07: Of Snowden and the NSA, only one has acted unlawfully and it's not Snowden <--Typical Lying Headline
2015-05-07: Stephen Colbert announces he will be funding every single South Carolina teacher-requested grant
2015-05-07: Adobe Form Fields appear to be blank -- five years and Adobe doesn't even admit this is a real bug
2015-05-07: Pythonista: Using pipista to install modules
2015-05-07: Using Encryption and Authentication Correctly
2015-05-07: [ ] How to Watch the Watchers
2015-05-07: NSA Dork: xkeyscore SIGINT - Google Search -- SHOW TO CLASS
2015-05-07: Adobe Reader is broken on Win 10 TP; form contents are lost
2015-05-07: Pythonista on the App Store on iTunes -- INTERESTING
2015-05-07: Infusion pump is hackable ¦ but rumours of death are exaggerated
2015-05-07: SHA-1 crypto hash retirement fraught with problems
2015-05-07: Android tool catches apps silently pumping hundreds of ad, tracking servers red-handed
2015-05-07: Advisory on CyberLock vulnerabilities draws fire from attorney
2015-05-07: OFAC! An acronym that cybersecurity professionals need to know
2015-05-07: Lenovo: researchers find 'massive security risk'
2015-05-07: Hard Rock's Las Vegas Hotel and Casino Hacked
2015-05-07: 'Rombertik' malware kills host computers if you attempt a cure
2015-05-07: Why Cops Like Me Are Quiet

2015-05-06: @War: The Rise of the Military-Internet Complex -- Recommended book ty @Claire_Medeiros
2015-05-06: dionaea catches bugs -- honeypot --- recommended by @Claire_Medeiros
2015-05-06: - Amun: Python Honeypot - recommended by @Claire_Medeiros
2015-05-06: US army calls for ideas on invisible uniforms for soldiers
2015-05-06: The NSA hides surveillance software in hard drives (from Feb.)
2015-05-06: MITMf - A Framework for Man-In-The-Middle Attacks -- USE FOR PROJECTS
2015-05-06: MITMf - Man-In-The-Middle Attack Framework -- ADD TO PROJECTS
2015-05-06: Hacking Secret Ciphers with Python eBook
2015-05-06: Dumping user passwords in plaintext on Windows 8.1 and Server 2012 -- USE FOR PROJECT
2015-05-06: Hostage saves herself via Pizza Hut app: "Please help. Get 911 to me."
2015-05-06: The Untold Story of Silk Road

2015-05-05: Microsoft bangs the cybersecurity drum with Advanced Threat Analytics
2015-05-05: Hacked Websites Redirect to via .htaccess and old Wordpress plugins -- GOOD ANALYSIS
2015-05-05: A Stealthy GPU-based Keylogger
2015-05-05: FireEye offers new details on customer liability shields under the SAFETY Act
2015-05-05: Attacking POS Supply Chains
2015-05-05: Cybercriminals borrow from APT playbook in attack against PoS vendors
2015-05-05: Lawmakers in France Move to Vastly Expand Surveillance
2015-05-05: Big Data Wall projects data gathered from smart phones
2015-05-05: Mailvelope - Chrome extension for GPG encrypted email
2015-05-05: Here's How to Download and Delete What Google Search Knows About You
2015-05-05: Tor Exit Node Geo-Locator

2015-05-03: Anonymous Hacks World Trade Organization, leaks personal data of thousands of officials
2015-05-03: FireEye customers get liability shield thanks to SAFETY Act
2015-05-03: Shooting reported at Prophet Muhammad cartoon contest near Dallas, Texas
2015-05-03: U.S. Will Change Stance on Secret Phone Tracking
2015-05-03: How The Wrong People Get Promoted And How To Change It
2015-05-03: Congress cannot be taken seriously on cybersecurity
2015-05-03: Forensics 1000 -- Red Star Korean OS
2015-05-03: Security Advisory Online Pharmacy
2015-05-03: The Tax Season's Fraud Epidemic
2015-05-03: My Struggle With the Last Great Taboo: Admitting My Salary
2015-05-03: Secunia report -- SHOW TO CLASS
2015-05-03: MalwareJake: College degrees in infosec

2015-05-02: LinkedIn joins social media losers
2015-05-02: Meeting Snowden in Princeton
2015-05-02: Microsoft’s YouthSpark Live event on Friday, May 8th in Mountain View
2015-05-02: Why the N.S.A. Isn't Howling Over Restrictions
2015-05-02: Grooveshark is dead
2015-05-02: Embedding classic MS-DOS games into tweets is now a thing
2015-05-02: Microsoft Security Advisory 3062591: Local Administrator Password Solution (LAPS) Now Available
2015-05-02: Tesla's Worst-Kept Secret Has Become Power Companies' Worst Nightmare
2015-05-02: Woman arrested after hijacking PCs, showing hardcore porn to victims
2015-05-02: Facebook bug led to security warnings, blocked links and deleted posts
2015-05-02: Revealed: The anti-virus vendor cheating in independent tests

2015-05-01: Fuzzing with AFL-Fuzz, a Practical Example ( AFL vs binutils ) -- USEFUL FOR PROJECT
2015-05-01: Security Bug in ICANN Portals Exploited to Access User Data
2015-05-01: Wordpress munching contagion turns Linux servers into spam bots
2015-05-01: MySQL SSL/TLS Connections at Risk Due to BACKRONYM Flaw
2015-05-01: FBI arrests JP Morgan Chase former employee for selling account data
2015-05-01: Medical Android Apps that Violate HIPPA Requirements -- SHOW TO CLASS
2015-05-01: Google's new version of Password Alert blocking bypass is bypassed
2015-05-01: [C] OS X 0day - works on latest verz -
2015-05-01: Boeing 787 software bug can shut down planes' generators IN FLIGHT
2015-05-01: Major London rail station reveals system passwords during TV documentary
2015-05-01: Congressman with computer science degree: Encryption back-doors are ˜technologically stupid

Slashdot Headlines
Greece Is Running Out of Money Cannot Make June IMF Repayment

Hubble Discovers a Fast-Aging Star Nicknamed "Nasty 1"

Machine That "Uncooks Eggs" Used To Improve Cancer Treatment

What AI Experts Think About the Existential Risk of AI

Microsoft Reportedly May Acquire BlackBerry

India Ends Russian Space Partnership and Will Land On the Moon Alone

Dell Precision M3800 Mobile Workstation Packs Thunderbolt 2 Quadro IGZO2 Panel

Al-Qaeda's Job Application Form Revealed

Google and Gates-Backed Khan Academy Introduces "Grit"-Based Classroom Funding

<em>A Beautiful Mind</em> Mathematician John F. Nash Jr. Dies

Soft Sensors Map Skin Mechanics

Universe's Dark Ages May Not Be Invisible After All

Nerve Cells Made From Blood Cells

Software Patch Fixes Mars Curiosity Rover's Auto-focus Glitch

Amazon Decides To Start Paying Tax In the UK

Search Slashdot

Updated 22 minutes ago.
How to Add Slashdot Headlines to Your Web Page

Digg   Slashdot   The Register   DFI   Wired   ZDNet   National Geographic   BBC   Eweek   PC World   News Now   CNN   Tech News World   CNET   MSNBC  

Old News

Old News: 2004      2005      2006      2007      2008      2009      2010      2011      2012      2013      2014      2015

Last updated: 3-16-15