| The World's Top 10 'Groundbreaking' Hackers Every security professional worth his or her salt has a list of the top hackers of all time. Some lists may focus on complexity of the attack and others may emphasize the amount of damage caused. The individuals on this list from Alan Wlasuk, a managing partner of 403 Security, are considered to have engaged in hacks that were ground-breaking at the time. READ MORE >> Android Trojan Stealthily Answers Incoming Calls The latest Nickispy variant can intercept incoming calls without the user's knowledge while sending call logs, text messages and other information to a remote server. Known as ADROIDOS_NICKISPY.C, the Trojan displays a Google+ icon on the handset and is installed under the name Google++. READ MORE >> Sponsored by IBM Work smarter to get the maximum out of your ideas at smartertechnology.com. News, information, and resources for your IT needs. Learn more | | Hackers Shift From Petty Vandalism to Massive Data Theft Cyber-attackers are hitting higher-profile targets and exposing ever-larger volumes of data, whether for financial gain, strategic advantage or to espouse "hacktivist" causes. READ MORE >> RIM Patches BlackBerry Enterprise Server to Fix PNG, TIFF Bugs Research In Motion closed several critical bugs in how MDS Connection Service and the Messaging Agent process PNG and TIFF image files on the BlackBerry Enterprise Server. READ MORE >> Google Sets Deadline for Enforcing Real Name Policy Google+ users who opt to use fake profile names will get a 4-day grace period to shape up or ship out. Google will suspend the accounts of those not in compliance. Google started a minor furor last month when it began suspending accounts of those it believes were pseudonyms or fake names. READ MORE >> | |  | |
 | | |  | |
No comments:
Post a Comment