Related topics: google · hackers · china · website · twitter

Privacy group gets NSA files on utility research

(Phys.org)—Files obtained by the Electronic Privacy Information Center (EPIC) and provided to CNET show that the National Security Agency (NSA) under its secret Perfect Citizen program is looking at the computerized systems ...

Web sites that can take a punch

The recent, well-publicized cyberattack on Google was just the latest skirmish in a long war. And like most long wars, this one features an arms race, as hackers seek out new security holes, and web site administrators try ...

An alert researcher, cooperation helped stem cyberattack

The cyberattack that spread malicious software around the world, shutting down networks at hospitals, banks and government agencies, was stemmed by a young British researcher and an inexpensive domain registration, with help ...

Tech companies eye security that goes beyond passwords

In late February, a thief or thieves cracked into Evernote's digital vault filled with log-ins, passwords and email addresses belonging to 50 million users. It was a shocking cyberattack considering the Redwood City, Calif., ...

Inside the secret Symantec building that keeps websites safe

Hidden within a nondescript building here is a highly secret Symantec facility protected by the sort of measures found in nuclear missile silos. Dubbed "the vault" by some employees, the bunkerlike operation bristles with ...

page 1 from 25

Computer insecurity

Many current computer systems have only limited security precautions in place. This computer insecurity article describes the current battlefield of computer security exploits and defenses. Please see the computer security article for an alternative approach, based on security engineering principles.

This text uses material from Wikipedia, licensed under CC BY-SA