Please turn on your JavaScript for this page to function normally.
Google won’t allow facial recognition on Glass

Whether Google Glass ships out to regular users later this year or the next, one things is sure: it won’t make use of facial recognition software – for now. The …

LinkedIn unveils optional 2-step verification

“Professional” social networking website LinkedIn is the latest in a string of popular online services and communities that have introduced optional 2-step …

Beware of Android Defender mobile scareware

Scareware aimed at mobile users is not nearly as ubiquitous as that directed at those who use Windows-run PCs. Nevertheless, there is some out there. Sophos’ Paul …

Police and FBI must return seized materials to Kim Dotcom

New Zealand High Court Justice Helen Winkelmann has ordered the NZ police and the FBI to go through the digital material seized following the arrest of Megaupload founder Kim …

Becoming a computer forensic examiner

Since the advent of affordable personal computers, digital devices, and later the Internet, these technologies have been used for both legal and illegal purposes, and in order …

Motorola is working on electronic tattoos and authentication pills

Motorola is trying to get back into the swing of things when it comes to innovation, and has been working on a number of fresh ideas regarding the future of authentication. At …

University of Illinois CS department machines compromised

Several computers in the University of Illinois Computer Science Department have apparently been compromised to host malware-serving websites, security researcher Conrad …

Apache server bug allows remote code execution

The existence of a “moderately critical” Apache HTTP Server vulnerability whose exploitation could allow attackers to compromise the system and execute arbitrary …

Evernote rolls out 2-factor authentication for paying customers

2013 seems the be the year of 2-factor (or 2-step) authentication. Following the introduction of the feature by the likes of Apple, Microsoft, Twitter and WordPress, Evernote …

Google defines disclosure timeline for actively exploited bugs

The debate regarding responsible vulnerability disclosure and full vulnerability disclosure has been started many times in the past, and it’s an issue that will continue …

Drupal.org forces password reset following breach

The server hosting the official website of Drupal, the popular content management platform, has been compromised and sensitive user data was accessed by the attackers, the …

Chinese army announces drill to test its digitalized forces

The Chinese People’s Liberation Army (PLA) has announced it will be holding a military exercise in June, aimed at testing “new types of combat forces including …

Don't miss

Cybersecurity news