MySpace hacker tells his story If Samy Kamkar plays his cards right, he may be allowed to visit MySpace again in just a few months. For the time being, however, he's not even allowed to touch a computer, following a January 2007 guilty plea for creating what many consider to be the first Web 2.0 worm: the Samy worm. 12 spam research projects that might make a difference Those who commit cybercrime know they need to stay on the cutting edge of technology to come up with new and different ways to swindle people. Luckily, the good guys are also spending time in research labs developing ways to thwart the latest tricks employed by spammers, phishers and other criminals. Hackers jack Monster.com, infect job hunters Monster.com took a portion of its Web site offline Monday as researchers reported that it had been compromised by an IFrame attack and was ... Misspelled children’s Web sites lead to porn Children’s Web sites are frequent targets of typo-squatting, a growing category of online fraud which lures unsuspecting Web surfers to malicious sites when they misspell the URL. Some typo-squatters lure children to pornographic Web sites. Swatters tricked AT&T while making fake 911 calls A Cleveland, Ohio, man has pleaded guilty to participating in a scheme that involved using AT&T employee passwords and identities to place false ... Industry must completely rethink security protocols for mobile devices, security pro says Open source mobile broadband is doomed unless carriers, software developers and device manufacturers are willing to completely ... FSF finalizes GPL-based license for Web services The Free Software Foundation has published a new open-source software license aimed at developers whose code is used for software-as-a- ... 2007 Gift Guide Cell phones and smart phones Check out our top picks for cell phones and smart phones. BLOGS Buzzblog: Half of stores surveyed "invite" wireless ID theft A check of some 3,000 retail outlets that use wireless to transmit customer data shows that about half fail to use adequate encryption, with half of that bunch using no encryption at all. Enjoy your holiday shopping. |
No comments:
Post a Comment