Why are websites getting your mobile-phone number? Are mobile-service providers leaking data into traffic destined for web servers? That's what a research analyst set out to prove. Read more The three types of online attackers Patrick Lambert describes the three main groups of attackers that security specialists are guarding against. Read more Infographic: Kim Dotcom and the Megaupload story While Megaupload's attorney tries to negotiate a deal with the government to preserve users' legitimate hosted files, check out this snapshot of Kim Dotcom fun facts and figures. Read more VeriSign repeatedly hacked in 2010 Verisign was repeatedly attacked in 2010 but the extent of what was stolen is unknown, and the company didn't even own up to it until late 2011. Read more |
No comments:
Post a Comment