Mobile Malware Descriptions
Avatars as communicators of emotions
Current interactive systems enable users to communicate with computers in many ways, but not taking into account emotional communication. A PhD thesis presented at the University of the Basque Country puts forward the use of avatars or virtual Intern...
Generic Malware Debunking Post
Climate Change Vulnerability
How To Remove Adware
Encrypt Your USB Stick With Truecrypt 6.0
Last year I wrote an article on the benefits of encrypting your PC folders with Truecrypt and I also briefly touched on being able to encrypt your USB stick with Truecrypt. Well, the other day I received a nice new 2GB USB stick as a freebie and so I...
Tis Gar Plen
Tips N Tricks | TroubleFixers - All about fixing computer...
An Interesting Report On Internet Security
Security is everyone's domain
Summary: Guest editorial by George StathakopoulosIn the first half of 2008, Microsoft Corp. released its latest Security Intelligence Report.
Malware bad guys tout new trojan guaranteed to evade filters...
A new Trojan making the rounds could potentially cause problems for security …
Understanding the Web browser threat - The Insecurity Iceberg...
Embedded.com is a leading source for reliable Embedded Systems development articles, tech papers, webinars, courses, products, and tools. Visit Embedded.com for the latest information on Embedded Development industries, insights, and educational res...
Beware of .ru Domains!
Virus Problems | TroubleFixers - All about fixing computer...
Mad Irish ::
Google Delivers 2% of World's Malware
Blogspot.com cited as the No. 1 host for malware
Sophos research says the anonymity of setting up a blog site plus the ability to post malicious code links in the comments section makes Google's blog site a target. Read this article by Robert Vamosi on CNET News.
Linux & Lip Gloss: Security University
Video - The animal emotion series - Animal pics 4... thought...
Create a Windows Daily Backup Script
This tutorial will show you how to use a simple Windows Batch file and the task scheduler to create an automated daily backup. We will use the date variable to backup the files into folders with the first three letters of the day as the folder name.
Products - Internet Security - Antivirus
Beware of World War III Hoax
Sam Johnston: DNS is dead... long live DNS!
Malware Forensics: Investigating and Analyzing Malicious...
Beloved websites riddled with crimeware • The Register...
ThinkGeek :: Stuff for Smart Masses
Selling geek t-shirts, mugs, ties, high caffeine products, and many other gifts for programmers, linux hackers, and open source geeks.
OnForce - Your Partner In Service
Security and Hacking Documentation
IHTFP Hack Gallery: Legend of Zelda "Triforce" on Great...
SniffPass Password Sniffer - Capture POP3/IMAP/SMTP/FTP/HTTP...
password monitoring software
Safe Hex - safe computing tips to defend against viruses,...
Safe Hex - safe computing tips to defend against viruses, worms, trojans, malware and other questionable code.
How to Hide Files in JPEG Pictures
If you're looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be
DHS Checkpoint Blog Entry 9: 'Cruz' Control
How to remove spyware from your computer for free
Free and easy ways to scan and clean spyware/adware from your computer.
Lithuania Under Russian Hacker Attack - Softpedia
The key to an open, transparent malware filtering system...
Were not that different…
Watch Out for an IE Zero-Day Attack
There's no fix yet available for the latest attack against Microsoft's browser.
Antivirus vendor introducing virtual keyboard for secure...
LinuxSilo.net: Hacker's manifest
Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
Index of /content/downloads/pdf
Heyelan - Land slide
What's My Pass?
Judge Protects YouTube's Source Code, Throws Users To The...
TechCrunch is a leading technology media property, dedicated to obsessively profiling startups, reviewing new Internet products, and breaking tech news.
Elderly abusers to be targeted by Crown Prosecution Service...
People who pick on and abuse the elderly will be treated more harshly under a government crackdown to be announced next month.
Lockedotnet: Windows Vista important security announcement...
Severe UPnP Flaw Allows Router Hijacking
Security researchers warn that 99% of home routers are vulnerable to this attack.
Bugmenot.com - login with these free web passwords to bypass...
Access and share logins for websites that require you to register in order to view content.
SQL Injection Attacks by Example
This site uses advanced css techniques
HackersLab @ Free Hacking Zone
Yahoo! pimping malware from banner ads • The Register
Mr. Microphone Hack!
Turn the classic 70's wireless toy into a modern high-tech spy device. I never picked up any chicks with it anyway. I was surprised what I heard. Check out m...
Mark Watson - Cracker Highlights (2008)
Get Geeky and Fix your PC with HijackThis
What is your nastiest experience with viruses and/or other malware? The other day just before presentations my friend came to me with his laptop and showed me the havoc that had reigned on it! He had burnt some discs for others, using data from their...
Smartphone Users Should Be Virus Conscious
How Secure Is Your Company?
To protect your business, think like a thief.
My neighbours are stealing my wireless internet access. I could encrypt it or alternately I could have fun.
Red box (phreaking) - Wikipedia, the free encyclopedia
Snelweg platgooien :)
Insecure.Org - Nmap Free Security Scanner, Tools & Hacking...
Network Security Tools/Software (Free Download) including Nmap Open Source Network Security Scanner; Redhat Linux,Microsoft Windows,FreeBSD,UNIX Hacking.
How to 0wn the Internet in Your Spare Time
DNS tools | Manage Monitor Analyze
DNSstuff offers DNS tools, Network tools, Email tools, DNS reporting and IP information gathering. Explore monitoring products and free DNS tools at DNSstuff.
Cross-site request forgery - Wikipedia, the free encyclopedia...
Peter Selinger: MD5 Collision Demo
PhreakVids.com - Videos Related To Phreaking
PhreakVidz.com - Videos Related To Phreaking
Sony BMG copy protection rootkit scandal
Iptables command - DD-WRT Wiki
Blackmail ransomware returns with 1024-bit encryption key...
Summary: Virus analysts at Kaspersky Lab (my employer) have intercepted a new variant of Gpcode, a malicious virus that encrypts important files on an infected desktop and demands payment for a key to recover the data.The biggest change in this varia...