ScienceDaily - 06-Mar-2014

An increasing number of unsecured, computer-guided production machinery and networks in production facilities are gradually evolving into gateways for data theft. New security technologies may directly shield the sensitive data that is kept there. ...
CNET - 05-Mar-2014

The NSA leaker, who is living in exile, will appear by teleconference on Monday during the interactive portion of the annual Texas festival. He joins fellow wanted man Julian Assange, who is also speaking remotely at SXSW Interactive. ...
CNET - 05-Mar-2014

Security & Privacy - CNET News CNET News 2014 Mobile World Congress English English Español Reviews Top Categories More Categories Car Tech Cell Phones Desktops Digital Cameras Home Audio Laptops Printers Tablets Televisions Forums Appliances Camcorders Cell Phone Accessories E-book Readers Games & Gear GPS Hard Drives & Storage Headphones Home Video Internet Access Monitors MP3 Players Networking...
CNET - 01-Mar-2014
Bad day for the Bitcoin exchange: CEO Mark Karpeles acknowledges that Mt. Gox lost some 750,000 customer bitcoins, plus 100,000 of its own. ...
CNET - 01-Mar-2014
Bad day for the big Bitcoin exchange: CEO Mark Karpeles says Mt. Gox lost some 750,000 customer bitcoins, plus 100,000 of its own. ...
CNET - 01-Mar-2014
The current CIO of security firm Artemis and co-founder of the rebellious counter-conference TrustyCon will be Yahoo's first CISO in more than a year. ...
CNET - 01-Mar-2014
German firm G Data Security alleges that newly detected malware known as "Uroburos" was made by the Russian government. ...
CNET - 01-Mar-2014
...
CNET - 01-Mar-2014

Security & Privacy - CNET News CNET News 2014 Mobile World Congress English English Español Reviews Top Categories More Categories Car Tech Cell Phones Desktops Digital Cameras Home Audio Laptops Printers Tablets Televisions Forums Appliances Camcorders Cell Phone Accessories E-book Readers Games & Gear GPS Hard Drives & Storage Headphones Home Video Internet Access Monitors MP3 Players Networking...
ScienceDaily - 01-Mar-2014
A new article proposes and tests four two-factor schemes that require servers to store a randomized hash of the passwords and a second device, such as the user’s security token or smartphone, to store a corresponding secret code. ...
ScienceDaily - 01-Mar-2014
Researchers used a novel methodology to gain new neurological insights into how users face security questions and how their personalities might affect their performance. ...
CNET - 28-Feb-2014
Government-sponsored malware, the legal implications of the US government's pro-spying defense, and a discussion of tools to fight for the future lit up the agenda at the first Trustworthy Technology Conference. ...
CNET - 28-Feb-2014
Google is taking additional steps with Verify Apps to protect Android users from potentially malicious non-Play Store apps, even after they've been installed. ...
CNET - 28-Feb-2014
Security conference in San Francisco meets with a wide range of protests by security professionals. ...
CNET - 28-Feb-2014
The two Internet powerhouses agree that it's time to stop fearing cloud security and embrace the future at the annual RSA Conference. ...
CNET - 28-Feb-2014
Manhattan US Attorney's office wants information from different Bitcoin exchanges concerning recent round of cyberattacks, says Reuters. ...
CNET - 28-Feb-2014
Researchers at England's University of Liverpool have created Chameleon, a virus that can proliferate via Wi-Fi as efficiently as the common cold infects humans. ...
CNET - 27-Feb-2014
Three of the options would change ownership of the data to a third party, while a fourth would kill the bulk data collection altogether, says The Wall Street Journal. ...
CNET - 27-Feb-2014
Some 360 million account credentials are newly available for sale on the black market, according to one security firm, and may be from several yet-to-be-reported security breaches. ...
CNET - 27-Feb-2014
According to one security firm, the 360 million account credentials are available for sale on the black market. ...