DDoS attack on feminist blog backfires on International Women’s Day Security An attempt to silence feminism blog Femsplain backfires on DDoS… rooter April 9, 2025 1 min read 0
7 tasks that waste your IT team’s time Security IT teams’ time is always limited, and it doesn’t help… rooter April 9, 2025 1 min read 0
Hackers phish for data with fake Apple Watch giveaway Security Apple fans keen to get their hands on the Apple… rooter April 9, 2025 1 min read 0
Will Windows 10 leave enterprises vulnerable to zero-days? Security One thing Microsoft has been very public about is Windows… rooter April 9, 2025 1 min read 0
CryptoFortress mimics TorrentLocker but is a different ransomware Security ESET assess the differences between CryptoFortress and TorrentLocker: two very… rooter April 9, 2025 1 min read 0
Operating System Vulnerabilities, Exploits and Insecurity Security iOS and OS X the most vulnerable operating systems? Don’t… rooter April 9, 2025 1 min read 0
FBI investigating apparent ISIS attacks on Western websites Security A number of seemingly unconnected Western websites were hacked over… rooter April 9, 2025 1 min read 0
How to Leak to a Journalist Security Neiman Lab has some good advice on how to leak… rooter April 9, 2025 1 min read 0
Arguing Against CALEA Security At a Congressional hearing earlier this week, Matt Blaze made… rooter April 8, 2025 2 min read 0
DIRNSA Fired Security In “Secrets and Lies” (2000), I wrote: It is poor… rooter April 7, 2025 2 min read 0