Top 10 breaches of 2014 attacked ‘old vulnerabilities’, says HP Security A report by HP has found that 44 percent of… rooter April 9, 2025 1 min read 0
Security terms explained: What does Zero Day mean? Security One of the terms I’m most often asked to explain… rooter April 9, 2025 1 min read 0
Europol shuts down Ramnit botnet used to steal bank details Security The Ramnit botnet that is said to have affected 3.2… rooter April 9, 2025 1 min read 0
Electronic health records and data abuse: it’s about more than medical info Security After the Anthem mega-breach, questions abound about possible abuses of… rooter April 9, 2025 1 min read 0
Blu-ray exploits could allow computer malware infection Security A pair of possible exploits in hardware and software used… rooter April 9, 2025 1 min read 0
FREAK attack: security vulnerability breaks HTTPS protection Security A widespread, long-standing security flaw that allows attackers to decrypt… rooter April 9, 2025 1 min read 0
Casper Malware: After Babar and Bunny, Another Espionage Cartoon Security In this post, we lift the veil on Casper –… rooter April 9, 2025 1 min read 0
Lysa Myers: “There are still only a handful of women in the security field” Security There are many female researchers and computer experts who contribute… rooter April 9, 2025 1 min read 0
DDoS attack on feminist blog backfires on International Women’s Day Security An attempt to silence feminism blog Femsplain backfires on DDoS… rooter April 9, 2025 1 min read 0
FBI investigating apparent ISIS attacks on Western websites Security A number of seemingly unconnected Western websites were hacked over… rooter April 9, 2025 1 min read 0