Anonymous #opPetrol target list has been released
Wire Transfer Company’s Tech Support Scam
WordPress E-Commerce Plugins Vulnerabilities
Google Docs hijacked by Trojan.APT.Seinup malware
Microsoft EMET Detect Eavesdrop Attack
Iran develops first national computer operating system
How Cyberwarfare and Drones Have Revolutionized Warfare
Belgian police seize huge drug haul as hackers tracked down
Quantum Dawn 2 cyber-attack drill
Anonymous Dutch intelligence analyst said The Dutch use the U.S.'s PRISM surveillance program
Syslog is the primary source of information about intrusion-related activity on a Unix system.
Most people now realize that computer security is hard. However, many people do not realize that creating a correct security policy is hard.
Speaker: William Winsborough · George Mason University
Knowledge is suppressed because of its power to change.
Online since 30-jan-2010