Posted by A Ocean on August 16, 2010 ·
Trojans and viruses may be soon a security threat of pasts. The smudges, mostly due to the oily residue left behind by fingers on your touchscreen mobile device may help an attacker deduce your password according to a study by the University of Pennsylvania.
The researchers studied two different Android smartphones, the HTC G1 and the HTC Nexus1, evaluating different photography techniques [...]
Posted by A Ocean on July 10, 2010 ·
Last week saw fraud occurring in the iTunes system, when a rogue developer had somehow managed to snag 42 of the top 50 sales positions in the App Store’s “book” category with seemingly bogus content. There was some correlation between those suspicious sales and word of an increase in iTunes account fraud. This week the scam seems to hit Travel apps, blogs are reporting [...]
Posted by A Ocean on May 25, 2010 ·
After facing severe negative reactions and criticism from all quarters about the privacy policy which has gone to the extent of people making their mind to quit Facebook altogether and events like quitfacebook.com gaining momentum Facebook’s CEO Mark Zuckerberg went on a damage control exercise. He admitted that his popular social networking tool had moved “too fast” and “missed [...]
Posted by A Ocean on March 10, 2010 ·
The Digital Economy Bill which was first announced in 2009 and reportedly is designed to curtail copyright infringement by users sharing files and media online has been criticized and condemned severely by many people, as its complicated and extremely stringent laws including the one which allows Internet Service Providers to give customer information to copyright holders who could sue customers [...]
Posted by A Ocean on March 8, 2010 ·
It is official now; Chinese hackers have raged a Cyberwar against the western world and no one has been spared whether its technology companies like Google and Intel or government agencies in the United States and European Union. These cyber attacks have much broader implications than what most people can imagine. Sensitive intelligence secrets being compromised and exposed to a communist country [...]
Posted by A Ocean on March 8, 2010 ·
Sending your large videos or business presentation files through online file storage sites such as yousendit or downloading the video shared by your friend through megaupload will soon be a thing of the past if the UK governments proposed ‘Digital Economy Bill’ passes which among other things “imposes obligations on internet service providers to reduce online copyright infringement, [...]
Posted by Ruk Cooray on February 26, 2010 ·
Twitter users have been hit by a phishing attack, the direct messages sent out say something along the lines of “This You????”, “hey, i’ve been having better sex and longer with this here” or “LOL this is funny” followed by a link to a phishing site that looks like twitter which then asks you to enter your twitter credentials in.
Video Explanation from Sophos:
According [...]
Posted by Ruk Cooray on February 24, 2010 ·
Image via CrunchBase
Intel has recently confirmed that it was a victim of the recent ultra-sophisticated cyber attacks. Though Intel has refused to comment on the possible connection of these attacks being linked with Operation Aurora which targeted Google, the timing of the two attacks is astonishingly similar. It’s hard for me to believe that it’s a mere coincidence that both these companies [...]
Posted by Ruk Cooray on February 23, 2010 ·
Image by d’n’c via Flickr
As per a report from Wall Street Journal, Google is all set to resume talks with Chinese government officials to get more clarity on the future of its business in China. The earlier round of talks had ended on a rather ugly note with Google threatening to shut shop and close all its operations in China.
All along, Google has strongly objected to censoring [...]
Posted by Ruk Cooray on February 19, 2010 ·
Image by José Goulão via Flickr
Some time back, Operation Aurora – the most ultra sophisticated hack attack ever was uncovered and the blame game between Google and the Chinese Government followed. While the spotlight shifted to the political picture, the scary part is that these attacks were far more brutal than what Google and others assessed.
NetWitness – a computer security company [...]