Monthly Archives: August 2012
Apple vs. Google Client Platforms: iPad and Chromebook comparison
Head of Recurity Labs Felix 'FX' Lindner presents an in-depth research at Black Hat Europe 2012, dedicated to differences in technical implementation and...
STOPzilla AntiMalware 6.0 review
At Florida-based iS3 security solutions provider, they claim their new STOPzilla AntiMalware to be a breakthrough product featuring "ultimate PC protection". In fact, this...
Bruce Schneier on Privacy in the Age of Big Data
Computer security expert and writer Bruce Schneier analyzes the trends of personal data collection and usage in the increasingly technological society.
The topic of...
Shaping Tomorrow’s Security Today: Digital Native Generation
Ex-CEO of Symantec Enrique Salem explains his viewpoint on the concept of "digital natives" at RSA Conference, and provides his vision of IT...
BullGuard Internet Security 2015 review
BullGuard Company’s origin dates back to 2002 when they came up with a simple all-in-one software solution to protect Internet users. This initial endeavor...
Reveton Trojan: fake FBI ransomware assaults US users
The Federal Bureau of Investigation is warning the Internet users of a dangerous and immensely aggressive virus called Reveton which is known to block...
How Terrorists Encrypt: Threatscape Overview
British investigative journalist Duncan Campbell speaks at DeepSec Conference about the use of cryptography by terrorists and outlines the related threatscape.
Thanks very much...
Multi-step iCloud account hack
Online criminals from Clan Vv3 have managed to send Amazon, Apple, Gizmodo, and Wired around the bend all together recently. Twitter and Gmail were...