Zeljka Zorz
Net neutrality soon to be on EU’s agenda
Lack of regulation has contributed much to the success of the Internet, and made it a hotbed for new ideas. But there are some things that should be regulated and enforced in …
FBI warns car buyers against scammy online deals
If you are looking to buy a car or other vehicle online, be careful not to fall for a scam that has lately had a resurgence and that will leave you without money and possibly …
E-voting system used in French election is flawed
A recent electronic election in France has proved electronic some voting systems still cannot be trusted not to include fraudulent votes. The town hall primary election which …
Web developer devises new phishing trick
A British web developer has devised a proof-of-concept phishing attack that could be way more successful than the standard fake login page with the wrong URL. Jack Shepherd …
U.S. judge orders Google to share user info with the FBI
Google has been ordered to comply with FBI requests for user information that came in the form of National Security Letters (NSLs) by U.S. District Court Judge Susan Illston. …
Google won’t allow facial recognition on Glass
Whether Google Glass ships out to regular users later this year or the next, one things is sure: it won’t make use of facial recognition software – for now. The …
LinkedIn unveils optional 2-step verification
“Professional” social networking website LinkedIn is the latest in a string of popular online services and communities that have introduced optional 2-step …
Beware of Android Defender mobile scareware
Scareware aimed at mobile users is not nearly as ubiquitous as that directed at those who use Windows-run PCs. Nevertheless, there is some out there. Sophos’ Paul …
Police and FBI must return seized materials to Kim Dotcom
New Zealand High Court Justice Helen Winkelmann has ordered the NZ police and the FBI to go through the digital material seized following the arrest of Megaupload founder Kim …
Becoming a computer forensic examiner
Since the advent of affordable personal computers, digital devices, and later the Internet, these technologies have been used for both legal and illegal purposes, and in order …
Motorola is working on electronic tattoos and authentication pills
Motorola is trying to get back into the swing of things when it comes to innovation, and has been working on a number of fresh ideas regarding the future of authentication. At …
University of Illinois CS department machines compromised
Several computers in the University of Illinois Computer Science Department have apparently been compromised to host malware-serving websites, security researcher Conrad …