Topics
Content Types
About 133 results
-
Malcovery Security: The company spammers and phishers hate
When a start-up company helps take down several major online spam and phish operations, it's time to look at what they are doing right.
-
National Computer Forensics Institute: Demystifying cybercrime
Knowing how to handle digital evidence and discovery correctly prevents costly mistakes. A federal facility in Birmingham, Alabama is working hard to improve that situation.
-
UAB takes aim at spammers, phishers, and purveyors of malware
Birmingham, Alabama, is fast becoming a hotspot for digital crime fighting. Together, let's learn what they're doing right.
-
Search engine bias: What search results are telling you (and what they're not)
Search-engine bias affects our perception of what online information is available, is that a good thing or not? Are there risks?
-
What’s better than creating your own DDoS? Renting one
Thanks to the cloud, anyone can now initiate a DDoS attack. Find out how booter services work.
-
Escaping the dragnet of surveillance: What the experts say about encryption
Just-released documents by the Guardian explain how intelligence agencies collude with technology companies to thwart Internet-based encryption protocols.
-
How safe are online password managers?
People who use online password managers have a lot riding on the application's integrity. What are the chances of others gaining access to the stored passwords?
-
Researchers reverse-engineer the Dropbox client: What it means
There were doubts about being able to reverse engineer heavily-obfuscated applications written in Python. Two researchers have removed all doubt by reverse engineering the immensel...
-
Is metadata collected by the government a threat to your privacy?
Seemingly unobtrusive digital bytes known as metadata have been vaulted to the tech media limelight. What is metadata, and why all of a sudden is it so interesting to so many?
-
Breach Detection Systems take aim at targeted persistent attacks
You've just been told to get a Breach Detection System in place. Where do you start? How about a buyer's guide created by an independent test facility?