Refine results:

8 results found

Sort by
  • article

    New Windows worm spreads by attacking weak passwords

    Posted Aug 29, 2011 - 12:25 pm

    A new Windows worm is working its way through company networks by taking advantage of weak passwords, security researchers said over the weekend.

  • blog

    Should a judge be able to force you to decrypt your laptop?

    Posted Jul 12, 2011 - 1:46 pm

    The White House and DOJ are pushing a judge to force the defendant in a mortgage scam to decrypt a laptop hard drive, which the EFF warns violates the 5th Amendment by forcing a defendant to help incriminate him or herself. So how private should your laptop really be?

  • blog

    LulzSec vs. Anonymous: Doing hactivism wrong

    Posted Jun 16, 2011 - 11:34 am

    LulzSec and Anonymous flame back and forth in a rivalry for Most Powerful Hactivist but could find that fighting allies wastes energy they should spend fighting The Man and hiding from cops.

  • article

    Browser wars, 2011

    Posted Apr 25, 2011 - 5:22 pm

    Which browser is best for security, speed, and compliance with web standards? To find out, we ran the new versions of Chrome, Firefox, Internet Explorer, Opera, and Safari through a battery of benchmark tests. Here's how they stack up.

  • article

    The wrong way to manage your passwords

    Posted Mar 7, 2011 - 8:28 pm

    Over the weekend I went camping with some buddies, and somehow the subject of computer passwords came up. I asked everyone how they manage theirs, and all six of them said the same thing: They store them in a text file, spreadsheet, or some other similarly unprotected document.

  • article

    Store, manage passwords with sticky password

    Posted Feb 28, 2011 - 8:52 pm

    Sticky Password ($30, 30-day free trial) helps you manage your ever-growing collection of passwords. I have about 400 of them stored in Mozilla Firefox, and I doubt I'm atypical. Many are useless or outdated; far too many are identical or similar. It's easy to slip into very bad habits, and to forget that even if you don't care if your log in to a minor blog site is hacked, you could lose it all if you use the same password for something more important. Further, you have passwords and codes for things other than Web sites--bank accounts, home security, credit cards.

  • blog

    Study: End users still the biggest hole in IT security

    Posted Feb 11, 2011 - 3:15 pm

    Study shows end users repeat the same password for multiple sites, making things easier for both them and hackers at the same time.

  • article

    Password reuse is all too common, research shows

    Posted Feb 10, 2011 - 9:49 pm

    A British security researcher has analyzed password data made public by Anonymous group hacks against Gawker and rootkit.com, and found that many users with accounts at both sites used the same password for their login credentials.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness