Home » Posts tagged "security" (Page 3)

New Java Exploit

  On Sunday January 13th Oracle released two patches for Java Security Alert CVE-2013-0422 which included two vulnerabilities.  Oracle confirmed that the flaws were only present in Java 7 versions and did not impact Java on servers, Java desktop applications, or embedded Java.  Java is...
Read More

GhostShell Leaks 1.6 Million Accounts from US Federal Agencies

Team GhostShell leaked more than 1.6 million accounts belonging to federal institutions such as the FBI NASA The Pentagon Interpol The data was dumped in a PasteBin.com post entitled #ProjectWhiteFox – Freedom of Information. Promising more attacks by the end of the year.  Team GhostShell says its agenda...
Read More

Anonymous Targets Westboro Baptist Church

Anonymous targeted the Westboro Baptist Church after members announce plans to picket Sandy Hook Elementary School, where a gunman killed 20 school children and six adults on Friday, Dec. 14.  The church group planned on picketing the school area and the funerals of the fallen...
Read More

Street Lights Are Recording Conversations

$3000 Street lights that are recording our conversations taking pictures and sending messages.  This is another example of big brother watching your every movement.  The inventor has contracts with the department of home land security and other government organizations. There is also news that the government is set to...
Read More

Encrypt Browser Traffic

We hear about the hackers who steal people’s sensitive information and often even their identities. So some of us decide to take action and employ some software to encrypt all inbound and outbound traffic from our computers. Nowadays there are several encryption programs that can...
Read More

Gmail Two-factor authentication

When people talk about keeping their personal information safe like there “Banking”, they need to understand just keeping your “Banking Information” safe is not enough.  You e-mail is where all your banking information gets sent, so you need to keep that secure first. The most...
Read More

PPTP & Wireless WPA2-Enterprise Not Secure

Tools released at Defcon by security researcher Moxie Marlinspike can crack widely used PPTP encryption in under a day using CloudCracker.  Moxie Marlinspike and few other researchers developed software to crack the encryption of any PPTP (Point-to-Point Tunneling Protocol) and WPA2-Enterprise (Wireless Protected Access) sessions that use...
Read More

Tumblr Worm Infecting Blog Sites

The hacker group GNAA has claimed responsibility for the Tumblr worm and has said 8,600 unique Tumblr users have been affected.  The massive bug is sweeping Tumblr today and has infecting some of the biggest blogs, including USA Today, Reuters, The Verge, and CNET. The...
Read More

Access Control

Access Control is defined as “any mechanism by which a system grants or revokes the right to access some data, or perform some action.”  Physical access by a person may be allowed depending on payment, authorization, etc. Physical security access control refers to the practice of...
Read More

Kaspersky Broken CSS Causes Defacement

The official page of Kaspersky Anti-virus 6.0 for Windows workstations that shows their anti-hacker settings has been defaced by a hacker who has placed a Nyan Cat animation there instead. However, when you look at the URL you will note that it’s the secure version...
Read More

Latest

tech support 10 Tools Every Computer Tech Needs
skype Using Skype To Replace Landline Phone
riff Bеѕt VR Apps and Games for Meditation
google pixel The World Is On Your Palm Now, Go Mobile
security lock Top In-Demand Skills For Cloud Computing

Tech Geek Today

Tech Geek Today

MonTueWedThuFriSatSun
      1
9101112131415
16171819202122
23242526272829
3031     
    123
45678910
11121314151617
252627282930 
       
 123456
78910111213
14151617181920
21222324252627
28293031   
       
 123456
78910111213
14151617181920
21222324252627
28293031   
       

Subscribe To The Technology Geek

Archives