ToorCamp is an American-flavored hacker camp.
“I did not do it! I just downloaded a torrent I found when I was looking for porn,” stated 24-year-old Alberto García Illera at the beginning of his Def Con presentation called “How to hack all the transport networks of a country.”
What if iris scans could be faked for real via a simple printed image to fool iris recognition systems?
Does anyone else shake their head in irritated bewilderment when privacy is quoted as the reason you cannot be told how your privacy has been invaded?
The Ultimate Guide to Social Engineering [PDF] states “social engineers offer free gifts of favors” counting on the fact that reciprocation is a human impulse. An example is to give a “plate of cookies,” but what if the bait goodies were more along the lines of a plate of nookie?
Mobile malware madness: Favorite target? Android. Here's how to protect your device.
Netflix is ready to fight the U.S. Senate on frictionless sharing. Do you want to automatically broadcast what you watch?
The Justice Department told a congressional committee that law enforcement and prosecutors would be crippled if they were required to obtain a search warrant for cell phone location tracking information. What happened to probable cause, the Fourth Amendment and a reasonable expectation of privacy?
Barclays contactless bank cards are vulnerable to electronic pickpocketing via NFC-enabled phones.
ReDigi wins round one of the battle against Capitol Records.
Anonymous hacktivists have started publishing the internal Stratfor emails in two different "teaser" edition sets.
Depending upon who you listen to, GPS tracking shouldn't be your only concern when you are out and about on the streets.
Cyberwarrirors are needed for 'hunter teams.' If cyberspace is like the wild, wild west, could you be a modern-day cyber cowboy?
Here's an interview with ethical hacker Chris Gates about the presentation: The Dirty Little Secrets They Didn't Teach You In Pentesting Class.
The Federal Reserve plans to monitor when the word "Fed" is used online, determine the mood of the conversation, and identify "key bloggers" and "influencers."
Articles by Darlene StormNext Page