| David Rice introduces his course SEC 616, Defensible .NET |
| David Willetts: UK firms need to 'fess up to security boobs |
| Daylight Saving Time |
| DB2 10 and DB2 9 for z/OS Product Publication refreshes for April 2013 |
| DB2 10 and DB2 9 for z/OS Product Publications refreshes for November 2012 |
| DB2 10 HADR Multiple Standby's |
| DB2 10, DB2 9, and DB2 V8 Product Publications have been refreshed for April 2012 |
| DB2 Editions and Features |
| DB2 for LUW Continues to Mature -- MONREPORT Reporting Module |
| DB2 LUW -- Hide SQL Body with GET ROUTINE and PUT ROUTINE |
| DB2 Resource Constraint Analysis -- Continued (3) |
| DDoS Attackers, Network Defense Firms Record Banner Year |
| DDoS crooks: Do you want us to blitz those phone lines too? |
| DDOS is down, but still a concern for ISPs |
| Deadly Device Hacks May Be Coming Soon |
| Dean Kamen Invents Stomach Pump For Dieters |
| Death Knell For Righthaven In 9th Circuit Decision |
| Debian development server compromised |
| Decade Old KDE Bug Fixed |
| December 2015 Microsoft Patch Tuesday |
| December 2016 Patch Tuesday Brief and Updates |
| Declassified LBJ Tapes Accuse Richard Nixon of Treason |
| Decoding malware |
| Decoding Pseudo-Darkleech (#1) |
| Decoding Pseudo-Darkleech (Part #2) |
| Deep Rants; CYA from botnets to phisherZ ; Malware Acquisition postponed |
| Defacement Contest |
| Default ‘Do Not Track’ Is Best Choice for Internet Explorer 10 Users |
| Default Password in Cisco MARS |
| Defcon, vendor-hacker-shmoozing, and Storm Center Handlers in the Desert |
| Defeating A/V by inserting forged data |
| Defense Distributed Has 3D-Printed an Entire Gun |
| Defense chief calls cyberspace battlefront of the future |
| DefenseCode turns up Linksys zero-day |
| Defining Threat Intelligence Requirements |
| deja vu - "25 new unpackers added in one week" |
| Deja Vu - Advances in Rootkit malware |
| Deja Vu - PHP(BB) attack increase reports |
| Deja Vu - Request for W32.Pasobir Malware Sample |
| Deja Vu - Snow.A |
| Deja Vu - worm attacks Windows and Windows Mobile powered devices |
| Delays on Windows Update & the Death of SUS |
| Delhi - [ Min 26.4 °C |
| Delhi - [ Min 26.6 °C |
| Delhi - [ Min 31.4 °C |
| Dell Buys Enstratius, Extends Cloud Reach |
| Derangement with an Exclamation Mark |
| De-registering vgx.dll in an enterprise |
| Design Spec: Design Overview |
| Design Specification : Conversion Specifications |
| Design Specification : User Help Design |
| Design Spec–System Test Specifications |
| Despite new security in Galaxy S4, BlackBerry remains king |
| Detecting attacks against servers |
| Detecting BlackWorm Without Signatures |
| Detecting DNS Tunneling |
| Detecting file changes on Microsoft systems with FCIV |
| Detecting Random - Finding Algorithmically chosen DNS names (DGA) |
| Detecting XCodeGhost Activity |
| Detection and Deployment Guidance |
| Determining Sun Java Vulnerability |
| Developer wins appeal - code is not physical property |
| Development timeline key to linking Stuxnet, Flame malware |
| Device Sniffs Out Signs of Life After Disasters |
| Devs cook up 'leakproof' all-Tor untrackable platform |
| DHCP exploit publicly available (MS06-036) |
| DHCP OS Fingerprinting |
| DHS Can Seize Your Electronics Within 100 Mi.of US Border, Says DHS |
| DHS wants your comments. |
| DHS warns of vulns in hospital medical equipment |
| DHS, FBI Warn of Denial of Service Attacks on Emergency Telephone Systems |
| DHS: America's water and power utilities under daily cyber-attack |
| Diary Update for Cisco Greeting and ARCserve Exploits and Scanner; Regular Diary: Kismet / Metasploit / New Buffer overflows ARCserve/ New Nigerian Scam / Google update / PwStealers project / Power Ou |
| Diary Updates- Got WINS Packets - Brazil Welcomes You - Framed! - Mailbag |
| Dick Parry: Culture change |
| Did Internet Sales Tax Backers Bribe Congress? (Video) |
| Did Sweden Pay Cambodia For the Pirate Bay Co-founder? |
| Did Syrian hackers take over The Onion's Twitter account? |
| Did you know there was a bunch of other stuff announced last week? |
| Did you know you can make DB2 LOAD run faster? |
| Did ZDI snub your 0-day attack? Packet Storm will buy it for $7k |
| Different strokes for different folks, spyware and browsers |
| Different ways of looking at security bugs |
| Digg Hints Its Replacement For Google Reader Will Include Social Media Content |
| Digital Citizenship Toolkit - Brochures, Factsheets & Tip Cards |
| Digital Pen Vibrates To Indicate Bad Spelling, Grammar and Penmanship |
| Director General of BBC Resigns Over "Poor Journalism" |
| Disaster Recovery Lessons You Might Have Missed |
| Disaster Recovery Starts with a Plan |
| Discourse: Next-Generation Discussion/Web Forum Software |
| Discovery of Early Human Tools Hint at Earlier Start |
| Dish on national security PR offensive against SoftBank |
| Disney sitcom says open source is insecure |
| Distributed FTP Brute Force Scans - Is radmin back? |
| Distributed FTP/Port 21 scan follow-up; Port 23 scan increases; |
| DNA barcodes leap out of the lab |
| DNS abnormalitities |
| DNS and DHCP Recon using Powershell |
| DNS cache poisoning again! |
| DNS Cache Poisoning Again; InfoCon Alert Status Calibration; NIST HIPAA Guide |
| DNS cache poisoning, again. |
| DNS Changer goes away on July 9th, 2012 |
| DNS Misbehaving |
| DNS problems at Network Solutions; Potential Problems with MS05-019; Filtering SSL |
| DNS problems? |
| DNS Reconnaissance using nmap |
| DNS Snort Signatures; Acrobat Reader Vuln;TCP Port 1025 Traffic; Excellent DNS Article |
| DNS vulnerability announced by NISCC today |
| DNSChanger Shutdown, Despite Laggards, Is a Good Thing |
| Do Extortionists Get Paid? |
| Do I have requirements for a separate business process flow |
| Do Insecure Open Source Components Threaten Your Apps? |
| Do we Know our enemy? |
| Do We Need a Longer School Year? |
| Do you find a Redbook useful? |
| Dockerized DShield SSH Honeypot |
| DoD Descends On DEFCAD |
| Does it Matter If You Cover Your Webcam? |
| Does Scientific Literacy Make People More Ethical? |
| DOJ asks FCC to delay Sprint-Softbank review |
| DOJ, MIT, JSTOR Seek Anonymity In Swartz Case |
| Dolphins Can Sleep One-half of Their Brain At a Time Say Researchers |
| Domain Hi-jacking Nightmare |
| Domain registrar attacked, customer passwords reset |
| Domaincop malpsam |
| Dominion Announces Plans To Close Kewaunee Nuclear Power Station In 2013 |
| DommJuice variant / AOL IM issue / ISC webcast / Microsoft Patches |
| Donations for Katrina victims - be careful |
| Don's Halloween Trick |
| Don't Build a Database of Ruin |
| Don't buy that security software! |
| Don't launch that file Adobe Reader! |
| Doomjuice/MyDoom.C, Sharp Increase in port 445 and 139 scans |
| DoS Exploit for MS05-053 released |
| DoS exploit publicly released for Cisco Aironet AP |
| DoS from 127.0.0.1; Server compromise at gnome.org; Netsky.P still spreading |
| Dotcom says new site legal, no revenge for Megaupload saga |
| Doubleclick DDoS'd, W32.Zindos.A Microsoft DoS, FXMYDOOM Feedback |
| Download.Ject Detection and Recovery -- New Phishing Attack Technique |
| Draft Computer Fraud and Abuse Act Update Expands Powers and Penalties |
| Dremel-Based Project Accepted As Apache Incubator |
| Dridex malspam example from January 2016 |
| Driver Trapped In Speeding Car At 125 Mph |
| Driver Update Addresses Radeon Frame Latency Issues |
| Drone security project to go open source |
| Drone Swarm Creates Star Trek Logo In London Sky |
| Dropbox gets a black eye in spam attack |
| Dropbox Phishing via Compromised Wordpress Site |
| Drupal Wishlist Module Cross Site Scripting Vulnerability |
| Drupal.org & group.drupal.org password disclosure, (Thu, May 30th) |
| Drupal.org User Accounts Compromised |
| Drupal's Creator Aims For World Domination |
| DSD's 'don't be stupid' mitigation strategies still work |
| Dshield down, Sun releases Solaris 10, Bots new?, Some links, Vuln in Skype |
| DShield is Famous |
| DSL Modem Flaw Lets Attackers Infect Millions of Computers in Brazil |
| DST Cisco Surprise |
| Dual-Booting PengPod Tablet Can Run Linux/Android |
| Duke Nuken 3D</em> Code Review |
| DUNZIP32.dll Buffer Overflow |
| Duqu malware resurfaces after five-month holiday |
| Dutch Architect Plans 3D Printed Building |
| Dutch Bill Seeks To Give Law Enforcement Hacking Powers |
| Dutch police arrest 17-year-old suspected of breaching hundreds of KPN servers |
| Dwindling Server Market? |
| Dyn.com DDoS Attack |
| Dynamic SQL Performance Tuning -- Continued (3) |
| e Equals One, Not MC-Squared |
| e H Roundup - Java vulnerability, Fedora 18 and Red October |
| EA Is the Game Company Disney Was Looking For |
| EA Makes Minor Tweaks To FIFA 12 For the Wii, Releases It As FIFA 13 |
| Early Discussions of Computer Security in the Media |
| Early vote count in Iran gives Rowhani wide lead |
| Easter Eggs FUN to find in your yard, BAD to find in your software. |
| Eavesdropping on Bluetooth Headsets |
| eBay CISO receiving security industry lifetime achievement award |
| ebay.co.uk |
| eBay/Paypal Phishing; Shame on that prophet; iframeDOLLARS; Cyber Extortion; OSX hardening; Incident Responder Analysis Tools |
| EC Software Help & Manual 'ijl15.dll' DLL Loading Arbitrary Code Execution Vulnerability |
| Educational Linux Distro Provides Tech-Bundle For Kids and Educators |
| Edward Tufte's Defense of Aaron Swartz and the "Marvelously Different" |
| EE.UU. culpa a Irán de ciberataques |
| eEye Releases Free Scanner for MS06-040 |
| eEye Upcoming Advisory - both uses and abuses Symantec security applications |
| EFF Jumps In To Defend Bloggers Being Sued By Prenda |
| EFF Resumes Accepting Bitcoin Donations After Two Year Hiatus |
| EFF Sues to Block New Internet Sex-Offender Law |
| Effective File Search (EFS) DLL Loading Arbitrary Code Execution Vulnerability |
| EFI rootkit for Macs demonstrated |
| E-Gold Scams |
| Egyptian Forces Capture 3 Divers Trying To Cut Undersea Internet Cable |
| Eight People Charged in International Cybercrime Scheme (June 12 & 13, 2013) |
| Einstein Letter Critical of Religion To Be Auctioned On EBay |
| Election poll shot down by DDoS-ers |
| Election Security Risks, Potential Voting Failures Loom |
| Eliminating 911 Misdials in Your MLTS/PBX |
| Elon Musk Lays Out His Evidence That NYT Tesla Test Drive Was Staged |
| Elon Musk Will Usher In the Era of Electric Cars |
| Email attachment vector for IE createTextRange() Remote Command Execution |
| Email From Beyond - Tell us your own Halloween stories |
| Email from Guy Rosen at Blue Security |
| Email hacks router |
| Email Ploy;Cisco Password Leak Source;Cisco CCO Password Reset Reply-To Spoof Concern;Patch Tuesday Preview;Windows 2000 SP4 Rollup 1 Re-Release |
| Emails Sent To The Handlers |
| E-mails with malicious links targeting Australia |
| Embedded systems vendors careless says Metasploit author |
| Embedded systems vendors careless says Metasploit author HD Moore |
| Embotics Tackles Virtual Machine Management With V-Commander |
| EMC IRM License Server DoS Server 4.6.1.1995 |
| EMC Navigates the IT Transformation Waters |
| EMC vuln gives mere sysadmins the power of storage admins |
| EMCworld 2013: VIPR, ONTAP, and the hidden burden of software-defined storage |
| EMET 5.5 Released |
| Empty emails? |
| Emscripten Compiler Gets Optimizations, Now Self-Hosting |
| Encryption of "data at rest" in servers |
| End of passwords' predictions are premature - Cambridge boffin |
| Energy assets in front line of cyber war |
| Energy Production Is As 'Dirty' As Ever |
| e-netprotections.su ?, (Fri, May 17th) |
| Enforcing USB Storage Policy with PowerShell |
| English May Have Retained Words From an Ice Age Language |
| Enhancing pentesting recon with nmap |
| ENISA recommends "assume all PCs are infected" |
| Ensuring that mobile applications are truly secure, part 2 |
| Enter the Trial in Steubenville, Where the Cast Is Not Merely Football Players |
| Enterprise Architecture state and causes (v) |
| Enterprise Architecture state and causes in ten points |
| Enterprise Architecture state and causes, (ii) |
| Enterprise Architecture supports business methods application rather than replaces them |
| Entertaining Bug in Microsoft Word |
| Entire Cities In World of Warcraft Dead, Hack Suspected |
| Entries Open For First Ever 24-Hour Raspberry Pi Hackathon |
| EP.net DNS Survey |
| EPA Makes a Rad Decision |
| EPA Report That Lowers Methane-Leak Estimates Further Divides Fracking Camps |
| EPA: No Single Cause For Colony Collapse Disorder |
| Epic and Mozilla Bring HTML5 OpenGL Demo To the Browser |
| Eric Cowperthwaite: Connect the dots |
| Erlang Getting Too-Big-To-Fail Process Flag |
| Ernesto domain name registrations up |
| ERP on the move |
| ERP Orchestration |
| ERP Selection and Implementation: It's All in the Timing |
| ERP Systems: Where E = Education |
| Errata, Mea Culpa, "latest" "Date released" and "Date Published" |
| Escaping the P2P-induced alert onslaught |
| Espionage - How Things Have Changed |
| E-Sports League Stuffed Bitcoin Mining Code Inside Client Software |
| Essays Related to NSA Spying Documents |
| Ethereal Advisory |
| Ethereal becomes Wireshark |
| Ethereal Security Issue |
| Ethereal Vulnerabilities / NetSky.P |
| Ethereal Vulnerability |
| Ethics / SSH brute forcing continues |
| Etsy Is Trying to Pop Silicon Valley's Meritocracy Bubble |
| Etymology; Homographic Attacks; and other BIG words |
| EU Antitrust Chief: Google "Diverting Traffic" & Will Be Forced To Change |
| EU Authorities To Demand Reversal of Google Privacy Policy |
| EU Calls for Unified Approach to Allocating "White Space" Spectrum |
| EU Court Asked To Rule On Private Copying |
| EU Data Protection Proposal Taken Word For Word From US Lobbyists |
| EU duties on Chinese solar panels losing member: state support |
| EU Passes Resolution Against ITU Asserting Control Over Internet |
| EU Privacy Watchdog To ICANN: Law Enforcement WHOIS Demands "Unlawful" |
| EU regulators side with Microsoft in IE10's 'Do Not Track controversy |
| EU says ready to launch trade dispute over China telecoms |
| EU Set To Charge Microsoft Over Ruling Breach |
| EU To Ban Neonicotinoid Insecticides |
| European Commission Launches $12 Billion Chip Support Campaign |
| European hackers suspected in Utah Medicaid files breach |
| European Parliament Decides Not To Ban Internet Porn |
| Even Windows 8 Users Prefer Windows 7 |
| Everyday is April Fools Day in your Mailbox |
| Everything old is new again - Blackhole exploit kit since November 2015 |
| Evidence for Unconscious Math, Language Processing Abilities |
| evilcode.class, (Sun, Mar 25th) |
| Evildoers can now turn all sites on a Linux server into silent hell-pits |
| Evolutions in the honeypot/honeynet arena |
| Example of Getting Analysts & Researchers Away |
| Excel Issue Scorecard |
| Excel new vuln FAQ |
| Ex-CIA Director Sees New Phase Of Warfare Where Cyberweapons Create Physical Destruction (March 4, 2012) |
| EXCLUSIVE - Microsoft, Symantec disrupt cyber ring, halt searches |
| Exclusive: Huawei CFO linked to firm that offered HP gear to Iran |
| Exclusive: Japan's Sharp cuts iPad screen output |
| Exclusive: Microsoft, FBI take aim at global cyber crime ring |
| Ex-Employee Busted For Tampering With ERP System |
| eXchange POP3 |
| Ex-Marine Detained For Facebook Posts Deemed "Terrorist in Nature" |
| Experiment Will Determine Dinosaur's Skin Color |
| Experts finger disk-wiping badness used in S Korea megahack |
| Experts: Iran and North Korea are looming cyberthreats to U.S. |
| Experts: Network security deteriorating, privacy a lost cause |
| Exploit #2 released for for Windows Services Insecure ACLs Local Privilege Escalation |
| Exploit Attempts for Drupal RESTWS .x Module Vulnerability |
| Exploit Available For Cisco IKEv1 and IKEv2 Buffer Overflow Vulnerability |
| Exploit available for MS05-011, Rumored spikes in 445 scanning |
| Exploit circulating for newly patched Oracle bug |
| Exploit Code for MS05-047 |
| Exploit code reported for CVS Vulnerability |
| Exploit for Cisco Vulnerabilities Released |
| Exploit for Snort BO available! |
| Exploit Kits are a mess, (Sun, May 13th) |
| Exploit o' the day: DROWN |
| Exploit: NCMedia Sound Editor Pro v7.5.1 SEH&DEP |
| Exploiting (pretty) blind SQL injections |
| Exploits Available For MS04-11 Vulns – **PATCH NOW** |
| Exploits for most recent Microsoft Patches |
| Exploits for new microsoft vulnerabilities. |
| Exploits in the wild for several PHP-based web apps |
| Explosive Detecting Devices Face Off With Bomb Dogs |
| Exposing the Machinery of the Resistome |
| Exposure to Backlit Displays Reduces Melatonin Production |
| Extending the range |
| Extracting Malware Transmitted Via Telnet |
| Extracting pcap from memory |
| Extracting Shellcode From JavaScript |
| EyeRing Could Help Blind People See Objects |
| Facebook acquires Face.com |
| Facebook Adds Privacy, Security Controls for Page Administrators |
| Facebook and physicians: Not good medicine |
| Facebook attacked with credential-harvesting malware |
| Facebook Banter More Memorable Than Lines From Recent Books |
| Facebook Begins Eliminating Fake Likes, Page Fan Counts Drop |
| Facebook Enables HTTPS By Default for North America |
| Facebook Faces High-Level Staff Exodus |
| Facebook gets freakier with Take This Lollypop |
| Facebook hacker comes clean on 'what really happened' |
| Facebook joins Google in warning DNSChanger victims |
| Facebook Joins Linaro Linux-on-ARM Effort |
| Facebook 'Likes' Used to Predict Personality Traits, Social Preferences |
| Facebook offers just a week of free Android AV |
| Facebook proposes more changes to privacy policy |
| Facebook Pushes Back Against Employers Wanting Passwords |
| Facebook scammers host Trojan horse extensions on the Chrome Web Store |
| Facebook SDK hole leaves accounts vulnerable |
| Facebook Sued By Rembrandt IP For Two Patent Violation |
| Facebook Switching To HTTPS By Default |
| Facebook Tests 'Want' Button To Hoard User Data, Save Its Stock Price |
| Facebook warns employers not to ask job applicants for log-in credentials |
| Facebook's Hackathons Get a Rethink |
| Factbox: Key companies in the phablet space |
| Failure Is An Option |
| Fake Adobe Flash Update OS X Malware |
| Fake Android antivirus app likely linked to Zeus banking Trojan, researchers say |
| Fake fingers fool Brazilian biometrics |
| Fake Chrome update for Android |
| Falling Windows RT Tablet Prices Signify Slow Adoption |
| False positive on sfc.dll |
| Famed Hacker Guilty of 'Stealing' iPad User Data |
| Family News Network of the ICRC - Hurricane Katrina |
| Fans Bring Back Half Life Game Series: Black Mesa Mod Launches 9/14 |
| Fantastic js1k Submissions |
| FAQ on PowerPoint 0-day |
| FAQ: Flame, the "super spy" |
| Farewell 6Bone |
| FAST MOVING EMAIL VIRUS, More IE scripting concerns |
| Fast-Food Logos Burned Into Pleasure Center of Children's Brains |
| FBI Agent's Laptop 'Hacked' To Grab 12 Million Apple IDs - UPDATED |
| FBI could be shutting down 13800 UK internet connections |
| FBI denies hackers' claims on Apple data |
| FBI denies leak of Apple codes |
| FBI frets about dumb security in smart meters |
| FBI Launches $1 Billion Nationwide Face Recognition System |
| FBI Looking Into HP's Charges Against Autonomy [REPORT] |
| FBI says Apple ID heist claim is TOTALLY FALSE |
| FBI: Cyberattacks could shove aside terrorism as No. 1 threat to US |
| FBI: Cyberattacks grow as national security menace |
| FCC asks for comments on mobile network shutdowns for public safety |
| FCC Moves To Boost Wireless Speeds |
| FCC posts Enquiry Documents on Google Wardriving , (Mon, Apr 30th) |
| FCC Seeking Public Comment on Cell Phone Blocking (March 3, 2012) |
| FCC To Review the Relative Value of Low, High, and Super-high Spectrum Licenses |
| FCC To Update 1996 Cell Phone Radiation Standard |
| FDA urges protection of medical devices from cyber threats |
| Fear and Imagination |
| February 2013 (RSU1301) service package has been tested and is now available |
| Fed says internal site breached by hackers, no critical functions affected |
| Fed says still determining extent of hacker breach, FBI probing |
| Fed still gauging extent of hacker breach, FBI on case |
| Federal Agencies and Fortune 500 Companies Eradicating DNSChanger (March 1, 2012) |
| Federal IT pros look at BYOD security, management concerns |
| Federal Reserve, DOE Confirm Hackers Breached Servers, Stole Data |
| Fedora 18 Installer: Counterintuitive and Confusing? |
| Fedora Core 4 goes into maintenance mode, FC1 and FC2 end-of-life |
| Feds Drop CFAA Charges Against 'Hacker' Who Exploited Poker Machines |
| Feds issue final 'Do Not Track' privacy recommendations |
| Feds say Megaupload user content could be deleted this week |
| Feds Warn of Cyber Threats, Seek Expanded Authority for DHS |
| Feedback On Simcity Gets User Banned From EA Forums |
| Feeding DShield with OSSEC Logs |
| Feeling a little tracked and monitored online |
| Fewer than half of Facebook and Google users understood the sites' privacy policies |
| FF/TB Updates |
| FFmpeg 0.10 "Freedom" released - Update |
| Field Day Exercise |
| Fifth Debian 6.0 "Squeeze" update released |
| Fighting TSA Harassment of Disabled Travelers |
| File-Sharing For Personal Use Declared Legal In Portugal |
| Fill out your email! |
| Final weeks of support arrive for service-pack-free Windows 7 |
| Finally, why supercomputing? |
| Financial services under more frequent DDOS attacks |
| FinCen quicknews hacked |
| Finding abuse contacts for a domain |
| Fingerprint reader reveals passwords |
| Fingerprinting Phishers |
| Finland a haven for vulnerable SCADA systems |
| Finland Hosts Mobile Phone Throwing Championships |
| Fireflies Bring Us Brighter LEDs |
| Firefox "new tab" feature tweaked following privacy concerns |
| Firefox ... |
| Firefox 1.0.1 fixes vulns; RootkitRevealer output; more on port 41523 |
| Firefox 1.0.3 Alternate Workaround; OhMyGodGoogleIsGone!, Update: IPSec vuln announced |
| Firefox 1.0.4; DNSSEC Tools; Phisher's benefit use Google link; Viewing Chat Logs; Web Browser Forensics; Gecko Based Browers HTTP Authentication Prompt Vulnerability |
| Firefox 1.5 beta 1 released |
| Firefox 1.5 Released |
| Firefox 1.5.0.3 Vulnerability Update |
| Firefox 1.5.0.6 release imminent |
| Firefox 12 released - can now update itself |
| Firefox 20 and Thunderbird 17.0.5 updates , (Wed, Apr 3rd) |
| Firefox 3.6.x approaches end of life |
| Firefox and Thunderbird 1.5.0.4 released |
| Firefox and Thunderbird Updates, (Wed, Jan 9th) |
| FireFox DoS exploit public |
| Firefox fix 1.5.0.3 / MySQL Patches |
| Firefox Is the First Browser To Pass the MathML Acid2 Test |
| Firefox patches; MS DoSed my Grandma; MS05-019 Exploit published |
| Firefox to spit out third-party cookies |
| Firefox update time |
| Firefox v 17.0 just released, more here: http://www.mozilla.org/en-US/firefox/17.0/releasenotes/, (Tue, Nov 20th) |
| Firefox v1.0.7 Released |
| Firefox Vulnerability |
| Firesheep's Scarier, More Muscular Half-Brother Cookie Cadger Released! Sort of. |
| First California lawsuit over mobile privacy issues crashes |
| First Evidence That Some Insects May Rely On Photosynthesis |
| First Exploit Attempts For Juniper Backdoor Against Honeypot |
| First Hurricane Matthew related Phish |
| First Impressions Inside the Project Holodeck VR Game World |
| First Known 'Social Chromosome' Found |
| First Mammals Observed Regenerating Tissue |
| First Mummies May Have Been Inspired by Field of Corpses |
| First Shift ! |
| First Vulnerability for Firefox 1.5 (released version) Announced - PoC available |
| Five Years of Storming |
| Fizzer Virus / Backdoor |
| FLAC Gets First Update In 6 Years |
| 'Flame' cyber-weapon went undiscovered for at least four years |
| Flame Malware: All You Need to Know |
| Flame spy virus gets order to vanish: experts |
| Flame worm's makers fail to collect Epic 0wnage award |
| Flamer Malware Spied on Middle East for More Than Five Years |
| Flamer Malware Spied on Middle East for More Than Five Years - Security - News & Reviews - eWeek.com |
| Flame's Windows Update hack required world-class cryptanalysis, researchers say |
| Flash Player 11.2 fixes critical vulnerabilities, adds silent updates |
| Flash Player update but no announcement, check your version http://www.adobe.com/software/flash/about/, (Thu, Sep 20th) |
| 'Flashback' Mac Malware: One More Reason to Switch to Linux |
| Flashback Mac Trojan earned $14,000 from ad clicks, Symantec |
| Flashback numbers not going down - still over half a million |
| Flashback trojan exploits unpatched Java vulnerability |
| Flashback Trojan still on 650,000 Macs, security company discovers |
| Flavours of Pi |
| Flaw with GPG Signature Verification |
| Flaws in Checkpoint and RealOne; MyDoom Update; AntiVirus Software; Data Call |
| Follow the Bouncing EMule |
| Follow the Bouncing Malware IX: eGOLDFINGER |
| Followup on challenge "Spam, Recon or ??" |
| Fondly reminiscing the past |
| Footy lovers hit in Wembley playoff card snatch scam |
| For Android Users, 2012 Is Still the Year of Gingerbread |
| For Business Analysts and Project Managers: Creating Proper Business Requirements for Integration Projects |
| For Your Inspection: Source Code For Photoshop 1.0 |
| Ford and GM Open Car Software To Outside Developers |
| Foreign hacks in China hit with malicious emails |
| Forensic Analysis on iOS Devices |
| Forensicating Docker, Part 1 |
| Forgery FBI email / Virus W32.Bugbros / New PoC for Linux Vulnerability |
| Forget about Top Chef, Chopped, American idol… Here comes….. Be the Next Microsoft Employee |
| Forget phones, PRISM plan shows internet firms give NSA <i>everything</i> |
| Forget the word “cyberwar” says Marcus Ranum |
| Form Spam: Increasing the Attacker's work function. |
| Former FBI Agent: All Digital Communications Stored By US Gov't |
| Former GOP Staffer Derek Khanna Speaks On Intellectual Property |
| Former Hacker: Today's Hacks Are All About the Money |
| Former Tribune staffer denies giving hackers log-in credentials |
| Forms Authentication: Remember Me? Its Hard Not Too! |
| Fortinet Debuts Secure Wireless LAN Platform |
| Fortinet Targets MSSPs, Enterprises With New Security Blade |
| Four Anons cuffed in Italy |
| Four how-to's on finding stuff in your inbox |
| Four Ways ShoreTel Dock Helps Drive UC |
| Fox News Parent NewsCorp May Face Corruption Investigation |
| Foxconn Denies Plans For New US Operations |
| Foxconn International shares drop 4 percent after profit warning |
| Foxconn International surges 35 percent as Citi report lifts iPhone hopes |
| Foxconn Int'l says unaware of any reason for stock jump |
| Foxconn Sees New Source of Cheap Labor: The United States |
| Foxconn shares surge on brokerage report on iPhone orders |
| Foxconn Thinks the iPhone 5 Is a Pain |
| Foxconn Workers On Strike Over iPhone 5 Production |
| Foxit Reader 'dwmapi.dll' DLL Loading Arbitrary Code Execution Vulnerability |
| Fox's Attempt To Block Ad-skipping TV Recorder Autohop Fails |
| F-Prot Anti-Virus Scanning Engine Bypass |
| Fragmentation Comes To iOS |
| Fragmentation Leads To Android Insecurities |
| fragmented packet challenge |
| Fraud: Evil People Doing Evil Things |
| Fraudsters nick BILLIONS from China's e-commerce Wild West |
| Fraudsters tempt Olympic fans with bogus streaming websites |
| Fred Flintstone, we'd like to help... |
| Free Font Helps People With Dyslexia |
| Free Software Quick Security Checklist |
| Free time? |
| Free tool to encrypt DNS requests released for Windows |
| Free Tools to Wipe Your Drives Securely |
| FreeBSD packet filter (pf) DoS using fragments. |
| FreeBSD Project Servers Compromised - http://www.freebsd.org/news/2012-compromise.html, (Sun, Nov 18th) |
| FreePBX Multiple Cross Site Scripting and Remote Command Execution Vulnerabilities |
| French Company Building a Mobile Internet Just For Things |
| freq.py super powers? |
| Fresh Apple Patches |
| Fresh batch of Microsoft patches next week , (Fri, Nov 9th) |
| Fresh food fans debunk anti–organic food report, get hacked |
| Friday Squid Blogging: Another Squid Comic |
| Friday Squid Blogging: Controlling Squid Chromatophores with Music |
| Friday Squid Blogging: Eating Giant Squid |
| Friday Squid Blogging: Efforts to Film a Live Giant Squid |
| Friday Squid Blogging: Giant Squid Engraving from the 1870s |
| Friday Squid Blogging: Sperm Consumption in the Southern Bottletail Squid |
| Friday Squid Blogging: Squid Escape Artist |
| Friday Squid Blogging: Squid Ink as a Condiment |
| Friday Squid Blogging: Squid Insurance |
| Friday Squid Blogging: Squid Recipe |
| Friday Squid Blogging: Squid Sacrifices Arms to Avoid Predators |
| Friday Squid Blogging: Squirming Tentacle USB Drive |
| Friday Squid Blogging: The Search for the Colossal Squid |
| From a NAND Gate To Tetris |
| From Data on the Web to Data Analysis - Python Quickstart |
| From extreme to in depth |
| From 'Quantified Self' To 'Quantified Car' |
| From the mailbag - |
| Front Page Hack Update, Veritas Advisories |
| FrSIRT exploits for MS05-044, MS05-045, and MS05-048 |
| F-Secure Security Bulletin |
| F-Secure Vulnerability; More on Symantec UPX and Microsoft patch set |
| F-Secure Vulnerability; Symantec Patch/Update; Microsoft patch set; IDS Vendor Review |
| F-Secure web console buffer overflow |
| FSF Certifies Atheros-Based ThinkPenguin 802.11 N USB Adapter |
| FSF Opens Nominations For Free Software Awards 2012 |
| FTC chairman: Do-not-track law may not be needed |
| FTC issues guidelines on facial recognition technology |
| FTC Releases Google Privacy Audit, Blacks Out the Details |
| FTC settles spying charges on rent-to-own computers |
| FTC sues Wyndham Worldwide over data breaches |
| FTC: ID theft again tops consumer concerns |
| FTP Scans - Universities only? : BHODemon followup |
| FTP Vulnerability & Accompanying Activity |
| FTP-Brute Force Attacks and Password Management |
| FUD flies as Raytheon reveals social media analysis tool |
| Fujitsu trials anti-phone fraudster tech |
| Fukushima's Fallout of Fear |
| Full Packet Capture for Dummies |
| Fun - data integrity / PHP up to date ? / WINS |
| Fun With Windows Netstat |
| Further Review of Port 2525 Activity; K-OTik.com reveals new English version of Website |
| Fusion-io Buys Hybrid Startup NexGen |
| Future Enterprise- The Future of Big Data |
| Gadgets add complexity to brutal bank layoffs |
| GAIM buffer overflow, Aitel paper and more XP SP2 |
| Galaxy S 4 Dominates In Early Benchmark Testing |
| Game Closure "DevKit" For Mobile HTML5 Games Is Open Source |
| Gamification Goes To College |
| Gaming app ENSLAVES punter PCs in Bitcoin mining ring |
| GAO Finds US Military's Critical Technologies List Outdated, Useless |
| GAO Report on DHS; ezSTUB; Worm.Gibe.F; BlueTooth Security? ClamAv MACosX |
| Gartner Buzzword Tracker Says "Cloud Computing" Still on Hype Wave |
| Gartner predicts huge rise in monitoring of employees' social media use |
| Gauss Espionage Malware Stealing Banking Data in Middle East |
| Gauss Malware Detected Through Unique Palida Narrow Font |
| GD DoS |
| GDI Attacks via Email; Natural Disasters and Data Recovery / Data Security |
| GDI Scanner Released |
| GDI Vulnerabilities : An open letter to Microsoft |
| GDI+ exploit mutation lessons and How to (not) report an attack to a large organization |
| Geeks On a Plane Proposed To Solve Global Tech Skills Crisis |
| Gene Therapy May Protect Against Flu |
| Genesco Sues Visa Over PCI Noncompliance Fines |
| Genetically Modified Plants To Produce Natural Lighting |
| Genuine TCP Port 0 activity; Osama was not caught, but some Windows users were; New RBOT variants using SQL & IIS |
| Georgia Tech and Udacity Partner for Online M.S. in Computer Science |
| Georgian police chiefs cuffed in cyber spy plot |
| German Court Rejects Apple's Privacy Policy |
| German Court: ISPs Must Hand Over File Sharer Info |
| German Federal Court Rules That Internet Connection Is Crucial To Everyday Life |
| German Government: Stay Away From Internet Explorer |
| German Police Stop Man With Mobile Office In Car |
| German Researchers Hit 40 Gbps On Wireless Link |
| German Spam (concise version); MS05-021 and Snort Signatures; Is it a security problem? |
| German spam source found, Real services vulnerability |
| German Spam...Maybe?; Academia Security Awareness |
| Get a 40% discount on your hotel room!, (Thu, Nov 8th) |
| Get up to speed with modern data bases/data stores quickly (SQL and NoSQL) |
| Get your fresh Firefox updates |
| Get Zapped While Playing Video Games |
| Getting Better Transparency From Oil Refineries |
| Getting out in front of BYOD |
| Getting Ready for Badlock |
| Getting Ready for macOS Sierra: Upgrade Securely |
| Getting Ready for the Holidays |
| Getting spamfiltered? |
| Getting viruses out of the AVG virus vault |
| GFI Scoops up MDM Technology From VizualMobile - Mobile and Wireless - News & Reviews - eWeek.com |
| Ghost of Christmas Botnets? |
| Ghoulies and Ghosties |
| GCHQ attempts to downplay amazing plaintext password blunder |
| Gift card from Marriott? |
| Giving Your Computer Interface the Finger |
| Glasses That Hack Around Colorblindness |
| Glenn Beck Reports CIA Plot Between Embassy Killing and Something Awful |
| Global action takes down tech support scam |
| Global Arrests And Charges Against Members of Lulzsec Hacking Group (March 6, 2012) |
| Global DNS cache poisoning attack?; Update... |
| Global telecoms giant ZTE sees gold in Chinese roots |
| Global Warming Felt By Space Junk and Satellites |
| Global Warming Has Made the North Greener |
| globalSCAPE CuteZIP Stack Buffer Overflow |
| Gmail javascript vulnerability (fixed) |
| Gmail SSL Cert Expiration |
| GNOME 3.8 To Scrap Fallback Mode |
| GnuPG (GPG) 2.1.9 release announced |
| GnuPG 1.4.5 released - remote execution possible |
| GnuPG new versions-upgrade now |
| Godzilla wreaks revenge on Pakistani government web sites |
| Going Up? |
| Gold Artifact To Orbit Earth In Hope of Alien Retrieval |
| Good Cop; Bad Cop; Domain Cop? |
| Goodyear's 'On TheGo' Self Inflating Tire |
| Google $22.5 Settlement With FTC Over Privacy Criticized by Industry Group |
| Google Apps for Business receives ISO 27001 certification |
| Google Backs Down On Maps Redirect |
| Google Bad and Google Good |
| Google Betting Its Google+ Systems Know What's Best For You |
| Google Blocks Author's Ads For Offering Torrent Of His Own Book |
| Google Blogger: Vietnamese HS Students Excelling At CS |
| Google Bolsters Email Security Defenses Against Hackers, Spammers |
| Google Desktop Has New Features |
| Google Developer Competition Aims at Chrome OS Security |
| Google Develops Context-Aware Voice Search For TV |
| Google Doubts Apple Will Approve Its New Maps Application |
| Google Fiber Draws Startups To Kansas City |
| Google Fiber turned Kansas City into a magnet for tech startups |
| Google Fined $22.5M Over Safari Privacy Violation |
| Google Formally Puts Palestine On Virtual Map |
| Google Gets Into Politics With Civic Info API |
| Google Gives 15,000 Raspberry Pis To UK Schools |
| Google Go language gets used: For file-scrambling trojan, though |
| Google Grants for summer of code |
| Google Hiccup, CGI Email Script Scanning, New NIST Doc, SANSFIRE |
| Google hit by building automation security FAIL |
| Google Chrome 25 Will Serve Searches Over SSL From the Omnibox For All Users |
| Google Chrome 27 Is Out: 5% Faster Page Loads |
| Google Chrome can pin web links to the taskbar |
| Google Chrome Introduces Do Not Track |
| Google increases vulnerability bounties to $20,000 |
| Google Invests $1 Billion To Build New London HQ |
| Google launches privacy plan amid protests |
| Google offers exploit bounties for Pwn2Own and Pwnium |
| Google Offers Help, Advice for Hacked Website Owners |
| Google Ordered Back To UK Parliament To "Explain Itself" Following Investigation |
| Google patches 9 Chrome bugs, pays more to top researchers |
| Google patches Chrome for second time in eight days |
| Google Patches Chrome, Changes Mixed Content Warnings |
| Google pays $40K to 'Pinkie Pie' for partial hack of Chrome OS |
| Google plonks reCAPTCHA on Street View, makes users ID your house |
| Google ploughs ahead with privacy changes, as EU concerns remain |
| Google Privacy Director Alma Whitten Leaving |
| Google Privacy Policies Assailed by EU: Report |
| Google Pulls Access To Unsupported But Popular Weather API |
| Google puts $1M on the line for Chrome exploit rewards |
| Google raises ante for next Chrome hacking contest to $2M |
| Google Reader Being Retired |
| Google readying on-device malware scanner for Android |
| Google Reconnaissance, Sprinter-style |
| Google Redesigns Image Search, Raises Copyright and Hosting Concerns |
| Google Releases Glass Factory System Image, Rooted Bootloader |
| Google Reports Government Surveillance Requests Continue to Rise |
| Google Search Appliance Vulnerability |
| Google Security Engineer Issues Sophos Warning |
| Google Snaps Up Security Firm VirusTotal |
| Google Strangeness: Is It New?; Filthy Minkey; New phpBB; FTBM VII: Afterglow |
| Google Takes Street View To the Galapagos Islands |
| Google Talks About the Dangers of User Content |
| Google Tests White Space Spectrum For School Broadband In South Africa |
| Google to double encryption key lengths for SSL certs by year's end |
| Google to face fresh ICO scrutiny over WiFi snooping |
| Google Unveils New Search Features, Including iOS Voice Search |
| Google Updates Chrome (March 5, 2012) |
| Google ups bug bounty to $20,000 per flaw |
| Google ups the ante in cloud storage–15GB |
| Google warns 20,000 websites they could be infected with malware |
| Google Web Accelerator continued; phpBB 2.0.15 released; Backdoors more popular than Viruses?; Anti-Spyware poll results; Google.com DNS glitch; SQL server 2000 SP4 |
| Google Web Accelerator; Snort with ClamAV; RSA SecurID WebAgent Overflow |
| Google Wins FTC Award for Robocall Prevention Technology |
| Google, Facebook May See Tougher Data Use Rules in Europe |
| Google, Microsoft butt heads over IE privacy skirting |
| Google, Oracle Deny Direct Payments To Media |
| Google: BadNews Malware Wasn't Really Bad, After All |
| Google's new privacy policy breaches European law, say data regulators |
| Google's Nexus Q Successor Hits the FCC |
| Google's Pwnium ends with no winners |
| Google's reCAPTCHA briefly cracked |
| Google's Self-Driving Cars: 300,000 Miles Logged, Not a Single Accident |
| Google's trap for Chrome exploit writers leads to crashes for users |
| GOP Brief Attacks Current Copyright Law |
| GOP Senators revise cybersecurity bill |
| Got packets? Interested in TCP/8909, TCP/6666, TCP/9415, TCP/27977 and UDP/7, (Mon, May 14th) |
| Government admits seizing two months of AP phone records |
| Government Agencies, Utilities Among Targets in ‘VOHO’ Cyber-Spy Attack |
| Government, business, military are internet security threats |
| Governments should invest more in catching cybercriminals, researchers say |
| GPL Nessus Forks (1 Comments) |
| Grampa's backup |
| GRCC Student placed 3rd in a CTF contest at GrrCON 2012 |
| Great Firewall architects fingered for GitHub attack |
| Greatfire Keeps Tabs On Chinese Censorship, Automatically |
| Green Party Releases International Joint Statement Criticizing the TPP |
| Greetings awareness - Awareness greetings ? |
| Grisoft AVG False Positive |
| Group Behind 'Aurora' Attack on Google Still Active |
| Group files FTC complaint against Google for privacy changes |
| Group questions Google government contract claims |
| GTK+ 3.8 Released With Support For Wayland |
| Guest Diary: Linux Capabilities - A friend and foe |
| Guest Diary: Xavier Mertens - Integrating VirusTotal within ELK |
| Guide to Finding Safe Online Merchants |
| Guided Tour of the Clearwater HIPAA Privacy and Breach Notification Assessment Software |
| Gunman takes potshots at Dell HQ, chopper search ensues |
| H&R Block Software Glitch To Delay 600,000 U.S. Tax Refunds |
| h00d IRC bot, localhost port 80 traffic |
| Hack Bill Challenge Winners Announced |
| Hack on Saudi Aramco hit 30,000 workstations, oil firm admits |
| Hacked BitCoin Exchange Sued By Customers |
| Hacker Activity |
| Hacker Bypasses Windows 7/8 Address Space Layout Randomization |
| Hacker Grabs 150k Adobe User Accounts Via SQL Injection |
| Hacker jailed for stealing identities of 8 million UK citizens |
| Hacker leaks source code of old VMware software |
| Hacker vs. Counter-Hacker — a Legal Debate |
| Hacker warns of zombies on 2 Mich. TV broadcasts |
| Hackers breached security firm Bit9, then attacked its customers |
| Hackers claim 12 million Apple IDs from FBI *new! |
| Hackers claim 12-M Apple IDs |
| Hackers claim to have "confidential" IAEA information |
| Hackers claim to have Mitt Romney's tax records |
| Hackers deface Indonesian president’s website |
| Hackers Dump Millions of Records From Banks, Politicians |
| Hackers get into Utah health department records |
| Hackers hit Major League Baseball teams' Facebook sites |
| Hackers chop down UN eco-agency, release rare data into wild |
| Hackers infect WordPress 3.2.1 blogs to distribute TDSS rootkit |
| Hackers now pick tools from script kiddies' toybox –Âreport |
| Hackers Stole Michael Jackson's Entire Catalog From Sony (March 5, 2012) |
| Hackers target Israel government websites |
| Hackers topple Huawei routers |
| Hackers Turned Defense Contractor QinetiQ Into Intelligence Playground |
| Hacking breach made us stronger says RSA |
| Hacking by the Syrian Government |
| Hacking the Emergency Alert System Is Funny Until It's Not |
| Hacking Tor, the anonymity onion routing network |
| Hacking Wireless Drivers for Fun and Profit |
| Hactivism: A Growing Concern for Network Security |
| Haiku OS Ported To Intel 64-Bit Architecture |
| Half of Ex-Employees Walk Off with Corporate Data: Symantec Survey Findings |
| Hallo Steffi! German spyware developers try their hand at humour |
| Hancitor Maldoc Bypasses Application Whitelisting |
| Hancitor Maldoc Videos |
| Hancitor/Pony/Vawtrak malspam |
| Handheld Black Hornet Nano Drones Issued To UK Soldiers |
| Handler Candy |
| Handlers - Down and Out in the Magic Kingdom |
| Handlers in Orlando |
| Handlers in Vegas - Slow Diary Day |
| Handlers On Duty |
| Handling Malware Samples |
| Handling phishing attack (2 Comments) |
| Hands On With Virtual Reality's Greatest Hope |
| Handset makers scurry to join Year of the Phablet |
| Hands-On With Intel's "Next Unit of Computing" Mini PC |
| Happy birthday, disk drive |
| Happy Father's Day |
| Happy Independence Day; Impending Storm; Spam Challenge Protocol Pros and Cons |
| Happy Mother's Day |
| Happy New Year |
| Happy now? Mobiles, cloud, big data now 'a growing security risk' |
| Happy Thanksgiving |
| Happy turkey day |
| Happy Valentines Day and Black Tuesday |
| Happy Valentine's Day; ARCserve probes?; OWA issue; new Opera version |
| Harris kills hosted cloud service program |
| Harvard Creates Cyborg Tissues |
| Has CES Lost Its Star Appeal? |
| hashcat and oclHashcat are now open source |
| Have you noticed a decline in the amount of Spam? This could be the reason! |
| Hawaii connectivity |
| Haxdoor Incident Details at Honeyblog.Org |
| Haxdoor.KI Deja Vu |
| Heads Up: new flaw in McAfee |
| Healthcare CRM in the Cloud |
| Healthcare in the Cloud - My Office Visit and ObamaCare |
| Healthcare industry group builds cybersecurity threat center |
| Heap overflow vulnerability in Opera 9.0, 9.01 |
| Help eliminate unquoted path vulnerabilities, (Wed, Nov 7th) |
| Help us out with a Christmas story |
| Help Wanted: Please help test our experimental PFSense Client |
| Helpdesk outsourcing quagmire at heart of whistleblower lawsuit |
| Helpful Tips For Successful CRM Implementation |
| Here are some technology predictions that didn’t quite hit the mark (or the side of a barn either) |
| Here are some useful tools (free) to help out IT Pros (and others) |
| Here it is -- Your turn to be heard |
| Here’s an update on my “If you have a laptop with a fingerprint reader, beware…” post |
| Here’s another tip on customizing Outlook. Changing some defaults |
| Here's What China Thinks of Ed Snowden and the NSA |
| Here's your opportunity to learn more about DB2 for z/OS and WLM |
| 'Heroes' creator Tim Kring working on conspiracy thriller with interactive elements |
| Hexing MAC address reveals Wifi passwords |
| Hidden IFrame Remains Popular With Browse-By Exploit Authors |
| Hidden Viral Gene Discovered In GMO Crops |
| Higgs boson exists |
| High End Graphics Cards Tested At 4K Resolutions |
| High Security Animal Disease Lab Faces Uncertain Future |
| High Tech Vending Machines Transform IT Support At Facebook |
| Highlights from the 2016 HPE Annual Cyber Threat Report |
| High-Risk SAP HANA Vulnerabilities Patched |
| High-Voltage Fences For Zapping Would-Be Copper Thieves |
| HIPAA and HITECH January 2013 eNewsletter Published |
| HIPAA log clarification; Mozilla/Firefox/Thunderbird vuln reported & fixed |
| Hiring Developers By Algorithm |
| HITRUST Backs 'Community Defense' Approach to Health Care Cyber-Security |
| HIV Vaccine Safe Enough To Pass Phase 1 Human Trials |
| Hobbyist Builds Working Replica of Iron Man's Laser Gauntlet |
| 'Holey code, Batman!' Microsoft to patch 12 vulns on Tuesday |
| Hollywood studios pushing for secure, next-generation "digital home library" |
| Homeland Security Level Raised to Orange, increase in DameWare (port 6129) scans and exploit, Microsoft Retires Products (Including Windows 98), And Earthlink Users Being Targeted by Scam Using IE bug |
| Hon Hai, Mozilla to launch mobile device running on Firefox |
| Honda's "Micro Commuter" Features Swappable Bodies |
| Honeyd 1.5 Released |
| Honeynet looks to trap USB malware |
| Honeyports, powershell script |
| Honeypot Abnormality |
| Honeypot Mirroring .edu domains under .eu / Active Threat |
| Hong Kong web host jailed for DDoS stunt |
| Horde exploit attempts in the wild |
| Horde exploit downloading Perl/Shellbot |
| Hosting Provider Automatically Fixes Vulnerabilities In Customers' Websites |
| Hotfix for MSIE problem related to MS06-042 |
| Hotmail and MSN problems |
| Hotmail seeing some temporary access issues, (Wed, Jan 9th) |
| Hounded By Recruiters, Coders Put Themselves Up For Auction |
| House Approves Extending the Warrantless Wiretapping Act |
| House Subcommittee Holds Hearing On TSA's "Scanner Shuffle" |
| Housewives On Trial In China For Smuggling In iPhones |
| How a 'Catch-22' Turns into a 'Shame on You' |
| How Apple's Story Is Like <em>Breaking Bad</em> |
| How Beer Gave Us Civilization |
| How Big Data Became So Big |
| How big of a deal is the new Benghazi testimony? |
| How CIOs Can Learn to Catch Insider Crime |
| How Cosmological Supercomputers Evolve the Universe All Over Again |
| How Do We Protect Ourselves from our Frienemies? |
| How do you deploy? |
| How Do You Spot a Genius? |
| How Does the Tiny Waterbear Survive In Outer Space? |
| How EVE Online</em> Dealt With a 3,000-Player Battle |
| How Facebook Will Power Graph Search |
| How Free Speech Died On Campus |
| How Google and Apple exposed their Achilles heels this week |
| How Hair Can be Used To Track Where You've Been |
| How China's Top Digital Spies Got Outed by Facebook and Twitter |
| How long until Skynet? |
| How many ?Epoch? times? Epocalypse.py timestamp converter |
| How Million-Dollar Frauds Turned Photo Conservation Into a Mature Science |
| How Mobile Devices Kill Your Creativity |
| How Much Beef Is In Your Burger? |
| How Newegg Saved Online Retail |
| How Noah Kagan Got Fired From Facebook and Lost $100 Million |
| How Not To Launch a Gadget |
| How online black markets work |
| How Open Source Could Benefit Academic Research |
| How Red Hat Hires |
| How Secure Is the Cloud? IT Pros Speak Up |
| How Stolen iOS Devices Are Unlocked |
| How Technology Might Avert an Apocalypse |
| How That 'Extra </nobr>.9%' Could Ward Off a Zombie Apocalypse |
| How the Critics of the Apollo Program Were Proven Wrong |
| How the Super Bowl Will Reach US Submarines |
| How the Syrian Electronic Army Hacked The Onion |
| How To Communicate Faster-Than-Light |
| How To Conduct a Bona Fide HIPAA Security Risk Analysis.... |
| How to contribute your data to DShield / ISC |
| How to create an e-book |
| How to Create Governance Policies in InfoSphere Business Glossary 9.1 |
| How to deal with Oracle patches? |
| How to Elegantly Neglect Explain Plans and Radically Transform SQL |
| How to Fix America's Harmful Hacking Laws |
| how to get published plus life, parenting, and dogs catching Frisbee |
| How to hack |
| How To Hack Twitter's Two-Factor Authentication |
| How to Meet Instant Demands for Business Analytics? |
| How To Promote Stage Comedy In a Geeky Way? |
| How to Recover Pictures from Corrupt Memory Card |
| How to Remove Duplicate Emails from 'Sent Items' Folder of MS Outlook 2007 |
| How To Report A BotNet, Glitch In The Matrix?, Bouncing Malware -IS- In The Works |
| How To Safeguard Loose Nukes |
| How to Set Up Your Own Malware Trap |
| How to setup penetration testing exercises. |
| How to Stop the Next Viral Facebook Post Outbreak |
| How To Talk Like a CIO |
| How Will Amazon, Barnes & Noble Survive the iPad Mini? |
| How you can help; Strange Spam Update; port 3001 update |
| How Your #Naked Pictures Ended Up on the Internet |
| How your Webhosting Account is Getting Abused, (Tue, Mar 26th) |
| How Your Webhosting Account is Getting Hacked, (Mon, Mar 25th) |
| How's business? |
| How-to Build Your Own Custom Integration Components |
| HP Discontinue OpenVMS |
| HP EVI vs. Cisco OTV: A Technical Look |
| HP Hires Ex-Nokia Exec, Spins Off WebOS, Reportedly Returning To Tablets |
| HP JetDirect Vulnerabilities Discussed, (Sun, Jan 27th) |
| HP Offers that “Cloud Thing” |
| HP ProCurve switches shipped with malware |
| HP Upgrades Mobile Thin Clients |
| HP's "System Management Homepage" web interface vulnerable |
| HTTP Public Key Pinning: How to do it right |
| Huawei CEO breaks silence, claims company isn’t a threat to U.S. security |
| Huawei denies spying, calls for global security standards |
| Huawei doesn’t expect to gain any ground in the U.S. this year |
| Huawei founder gives first ever media interview |
| Huawei checking claims of vulnerabilities in its routers |
| Huawei is betting big with a new metal smartphone |
| Huawei is now the world’s third largest smartphone vendor, but still far behind Samsung and Apple |
| Huawei says U.S. probe unlikely to affect other business |
| Huawei says U.S. probe unlikely to affect other overseas business |
| Huawei says US stance is “protectionism” |
| Huawei says US stance is 'protectionism' |
| Huawei to continue talking with government over network issue - CEO |
| Huawei to continue talking with UK government over network issue: CEO |
| Huawei told not to apply for Australian broadband project |
| Huawei USB modems vulnerable |
| Huawei: 'trust us, we are being transparent' |
| Huawei’s Ascend W1 Windows Phone 8 smartphone revealed in leaked photos |
| Hubble Discovers 'Planetary Graveyard' Around White Dwarf |
| Huge amount of Visa and Mastercard information hacked |
| Huge cyber bank theft spans 27 countries |
| Hugo Awards Live Stream Cut By Copyright Enforcement Bot |
| Human Rights Watch proposes new laws of robotics |
| Hunting for Executable Code in Windows Environments |
| Hunting for IOC's with ioc-parser |
| Hunting for Juicy Information |
| Hurricane Katrina Follow-UP |
| Hurricane Katrina Preparations; Broken Mytob? |
| Hurricane Katrina; ShellBOT/awstats; Long Registry Value Names |
| Hurricane Rita Scams ALREADY! |
| HyTrust Adds �Secondary Approval` Security to Protect Virtual Environments |
| Challenge Update |
| Challenge: What can you do with Funky Directory Names (Part 2), (Mon, Apr 16th) |
| Changed Infocon status to Yellow, re: Windows Internet Explorer vulnerability |
| Changing Profile Picture in Lync 2013 |
| Changing Threat Models |
| Chat Logs Location; Microsoft Security Advisories |
| Cheap Four-fingered Robot Hand Edges Closer To Human Dexterity |
| Check Point harnesses cloud security to deter botnet infections in enterprise |
| Check Point Outbound Traffic Mystery |
| Checking for .wmf Vulnerabilities |
| Checking Media Type from Python |
| Chernobyl Plus 7 Years |
| Chief's Picks: Videos from BlackHat Briefings USA 2012 |
| China calls U.S. the "real hacking empire" after Pentagon report |
| China companies plan to step up Europe investment |
| China cracks down on mail servers |
| China derides U.S. "Cold War mentality" towards telecoms firm Huawei |
| China fingered for Coca Cola hack - report |
| China Hacked the New York Times for Four Months Straight |
| China is world's most malware-ridden nation |
| China options limited as U.S. panel outcasts Huawei, ZTE |
| China rechaza acusaciones de EEUU contra firmas telecomunicación |
| China's Alibaba To Outsell Amazon, eBay Combined |
| China's Android users warned of giant botnet |
| China's Huawai criticizes US security complaints |
| China's Huawei criticizes US security complaints as trade protectionism, promises transparency |
| China's Huawei says it has done poor job communicating |
| China's Huawei says will increase transparency |
| China's Huawei vows to become more transparent |
| China's internet security giant Qihoo planning global domination |
| China's Radical New Space Drive |
| China's Wanda in talks with "well-known" hotels for U.S. buys |
| China's Yearly Budget For High-Speed Rail: $100 Billion |
| China's ZTE slumps to quarterly loss, margins bleed |
| Chinese Android trojan buys applications |
| Chinese arrest 9,000 cyber-crims |