
How the iCloud Hack Happened and How to Avoid Being Next
Tips: Do not give any online retailer your credit card information; use two-factor authentication in g-mail; and do not "daisy chain" e-mail accounts

How the iCloud Hack Happened and How to Avoid Being Next
Tips: Do not give any online retailer your credit card information; use two-factor authentication in g-mail; and do not "daisy chain" e-mail accounts

"Doomsday Virus" Fizzles Out, Thanks to Internet Providers
ISPs redirected traffic early this week to protect customers from DNSChanger malware, but the move could be seen as just kicking the can down the road

Self-Destruct Button Toasts Solid-State Hard Drive
The drive can overwrite its memory cells with junk data so it can't be read or send an electric pulse to flood the memory cells and burn them out

India Becomes World's Top Spammer
The vast majority of spam comes from home computers that have been compromised by hackers and botnets, an expert says

Smart Phone Makers Gave India Spy Tools, "Leaked" Memos Say
Purported Indian intelligence memos also state that the backdoors provided by Apple, Nokia and RIM allowed India to spy on U.S. government officials

Spam Hits Lowest Point Since 2008
The decrease may be a result of recent takedowns of two botnets disarmed by the FBI earlier this year

Printers Can Be Hacked to Catch Fire
These devices are completely open and available to be exploited, a researcher says

Cyberwar Most Likely to Take Place among Smaller Powers, Experts Say
Small, faraway conflicts could precipitate an attack against the U.S., so cyberdefense could drop the 'fortress' mentality for a focused set of solutions

QR Tags Can Be Rigged to Attack Smart Phones
A blogger has demonstrated how these innocuous tags can be made into cyber-crime weapons