|
http://www.netfilter.org/
|
Linux:
20 Iptables Examples For New SysAdmins |
Cloud
Computing on Resources Page |
Intel
Cloud Computing Security planning guide |
Cloud
Computing Explained:
Implementation Handbook |
|
Introduction
to Wireshark (Part 1 of 3) 9:06
|
Cookies
and Grabbing Passwords with Wireshark (Part 2 of 3) 5:11
|
Data
Mining using Wireshark (Part 3 of 3) 6:03
|
The
Ultimate Wireshark Tutorial 49:27
|
wireshark
tutorial,Top 5 features you must Know in 5 minutes 9:05
|
|
Bumpkey
4:58
|
AirCrack-NG
for Windows for Breaking WEP/WPA 12:40
|
John
The Ripper To Crack Passwords-BackTrack Tutorials For Beginners 2:50
|
Nessus Videos
|
Wireless
WEP Key Hacking 5:44
|
|
|
|
|
|
|
12/2
|
Google Glass to get Intel processors
|
New malware targets password managers
|
Postal Service almost never denies mail-surveillance requests
|
Uber reportedly gave a job applicant full access to customer travel records
|
Wired: How to Anonymize Everything You Do Online
|
|
Supreme Court To Decide Whether Rap Lyric Threats Are Free Speech
|
Five Best Custom PC Builders
|
DVD rips of 'Fury,' 'Annie,' 'Mr. Turner,' and 'Still Alice' hit the web following Sony Pictures hack
|
Black Friday, Cyber Monday for Crooks, Too!
|
A World Without Net Neutrality Already Exists
|
|
Debian Forked Over Systemd
|
Sony Pictures' computers are still locked as hackers demand equality
|
Google Glass Is Dead; Long Live Smart Glasses
|
Fix Yosemite Wi-Fi Issues with a Terminal Command
|
JavaScript Regular Expression Visualizer
|
|
US courts hope an old law will help them bypass phone encryption register
|
How to configure an NFS server and mount NFS shares on Ubuntu 14.10
|
FBI Agents Pose as Repairmen to Bypass Warrant Process
|
Home Depot faces 44 lawsuits post-breach
|
15 Documentaries About The Internet, Hacking, Startups & Cyberculture [Stuff to Watch]
|
|
Sony Breach May Have Exposed Employee Healthcare, Salary Data
|
US parking operator: YEP, hackers got your names, credit card numbers, secret codes...
|
How do You Password Protect a Folder on Linux/Unix without Encryption?
|
Network Security Needs Big Data
|
FBI: Watch out for HDD-BUSTING Sony megahack malware
|
11/20
|
Yahoo
Will Soon Become The Default Search Engine In Firefox
|
Motorola’s
New $25 Dongle Helps You Find Your Lost Keys, Unlocks Your Phone
|
Coin
Is Finally Shipping To Early Backers
|
10
top security threats of 2014 (so far)
|
iPhone
6S, Smartwatch: What You Can Expect from Apple in 2015
|
|
How
Splitting A Computer Into Multiple Realities Can Protect You From
Hackers
|
Wal-Mart
Scammed into Selling PlayStation 4 for $90
|
Microsoft
patches critical Windows Server vulnerability
|
WhatsApp
taps Open Whisper for end-to-end encryption
|
Your
paper brain and your Kindle brain aren't the same thing
|
|
How to
Run Android Apps in the Google Chrome Browser
|
The
Success Theater: Don't Confuse Enviability for Happiness
|
Keep
This Java Cheat Sheet on Hand While You're Learning to Code
|
11
things we just learned about how the Apple Watch works
|
EFF,
Others Launch New Free Security Certificate Authority To 'Dramatically
Increase Encrypted Internet Traffic'
|
|
Google
Glass Application List
|
Samsung
realizes it’s making too many phones, will cut lineup by 30%
|
6
Customization Tricks Only Possible In Firefox
|
The
Tech Skills and Courses Google Recommends for Software Engineers
|
Learn
to Build Android Apps with This Curated Collection of Courses
|
|
Citadel
Malware Steals Password Manager Master Passwords
|
Intel
to work with Europol on fighting cybercrime
|
Hackers
blamed for unusual tweets from Jeremy Clarkson, Columbian FARC rebels
|
Hackers
turning smartphones into slave armies
|
Next
Year's DDOS Attacks to Come From Vietnam, India and Indonesia
|
11/18
|
What
File System Should I Use for My USB Drive?
|
Linux
Vs Unix: The Crucial Differences That Matter To Linux Professionals
|
What
Really Happens When You Delete Something from Your PC
|
Apple
Patents A Mouse With A Built-In Scanner And Display
|
Coinbase
Launches Bitcoin-Based Tips, Micropayments
|
|
Google
Brings Autoscaling To Compute Engine
|
As
Developers Depart, Google Glass Is Ready To Become This Era’s Segway
|
NOAA
Reveals Four Websites Compromised
Feds
'covered up' Chinese hack on US weather systems
|
Large
Number of Tor Hidden Sites Seized by the FBI in Operation Onymous were
Clone or Scam Sites
|
The
Current State of Smart Locks
|
|
Snapchat
Now Lets You Send Money To Friends Through Snapcash Deal With Square
Cash
|
Online
Drug Dealers Are Now Accepting Darkcoin, Bitcoin’s Stealthier Cousin
|
Two Dudes
Prove How Easy It Is to Hack ATMs for Free Cash
|
AT&T
Stops Using Invasive ‘Perma-Cookies,’ But It May Turn Them Back On
|
Assange
Announces WikiLeaks is Preparing a New Series of Leaks
|
|
New
York City is building 10,000 internet pylons for free public Wi-Fi
|
Is
Your Police Force Wearing Body Cameras?
|
Our
devices are listening to us all the time -- but do we care?
|
Masque
Attack — New iOS Vulnerability Allows Hackers to Replace Apps with
Malware
|
Introducing
Lantern: One Device = Free Data Forever
|
|
Can
the new iBanking Android malware be stopped?
|
How
to Position IT Security as an Enterprise Profit Center
|
How
to Unlock Hidden Settings In Your Favorite Software
|
81%
of Tor Users Can Be De-anonymized By Analysing Router Information
|
Your
Mac Logs Everything You Download, Here's How to Clear It Out
|
|
8
Email Security Tips You Can Share With Friends & Colleagues
|
Stupid
Geek Tricks: Hide Data in a Secret Text File Compartment
|
Open
Source Self-Healing Software For Virtual Machines
|
Google
Wallet vs. Apple Pay: What You Need to Know
|
Quantum
Computers: The End of Cryptography?
|
11/13
|
This
Is How ATMs Get Hacked in Russia: Using Explosives
|
FBI’s
most wanted cybercriminal used his cat’s name as a password
|
U.S.
weather system hacked, affecting satellites
|
Why
passwords have never been weaker—and crackers have never been stronger
|
This
is what the web looks like without ads
|
|
We’re
long overdue for replacing Social Security Numbers as our main
identifier
|
A
German Cloud Company Is Offering Free Heat If You Have Room for Some of
Its Servers
|
28 Days
After Drupal Exploit
|
Typewriters
are back, and we have Edward Snowden to thank
|
Samsung's
Gear VR is virtual reality on the go
|
|
Samsung’s
New Smart TV Development Platform Runs On Tizen
|
MLB
Runs Its Massive Statcast Tool In The AWS Cloud
|
Microsoft
Takes .NET Open Source And Cross-Platform
|
Microsoft
Launches Free, Unrestricted Version Of Visual Studio For Small Teams
|
Amazon
Is Expanding Its R&D In Cambridge, U.K., With A Focus On Prime Air
Drones And Speech Tech
|
|
Amazon
Cloud Drive Gets Its Own API
|
60
seconds with the world's first Bluetooth padlock
|
Amazon
Launches Aurora, A High-Performance Relational Database Service
|
Two-thirds
of global executives expect a data security breach but fail to
recognise long-term damage, new report reveals
|
Website
hacks into thousands of security cameras
|
|
Windows
Has a Huge Vulnerabilty, Get the Patch Now
|
U.S.
and China Agree to Tariff-Free Technology Trade
|
Exchange-traded
fund seeks to tap into cyber security market
|
A
New Android App that Turns Your Smartphone into a Hacking Tool
|
IBM
launches new cloud security practice
|
|
Why
Amazon Echo is the future of every home
|
Beginner’s
Electronics: 10 Skills You Need to Know
|
Flux’s
3D Printer Is Also A Scanner, Laser Engraver And More Thanks to A
Modular Design
|
Study:
9 in 10 Americans agree control over personal information is lost
|
Get
Immersive Mode For All Android Apps – No Root Required
|
11/11
|
Watch
That Wi-Fi: Hackers Use Hotel Internet to Steal Nuclear Secrets
|
Hacker
Lexicon: What Is a Zero Day?
|
Android
5.0 Lollipop Looks Like Solid Upgrade for Latest Devices
|
OpenStack
vs. Amazon: The Power of Distributed Computing
|
Detecting
Fraud in an OpenStack Cloud
|
|
Big
Data: Cyber Security's Silver Bullet? Intel Makes the Case
|
President
Obama urges the FCC to treat the internet as a utility
|
Apple
site lets you deactivate iMessage and solve your missing text problem
|
What
is Amazon Echo?
|
Tails OS:
Privacy for anyone anywhere
|
|
Are
Hacked Email Account Checking Tools Genuine Or A Scam?
|
What
Is Half-Duplex And Full-Duplex Operation, And How Does It Affect Your
Router?
|
10
Useful OS X Yosemite Features You Might Have Missed
|
Popcorn
Time Now “Impossible” to Shut Down
|
Wi-Fi
traffic can be used as covert communication channel for malware
|
|
TBR
perspective: Symantec’s move will disrupt security and storage
landscapes
|
10
Reasons It's Time to Adopt Microsoft Office 365 Cloud App Suite
|
Why
advanced threats are less dangerous than simple attacks
|
USPS
investigates breach, more than 800K employees possibly affected
|
How
to Find and Remove Duplicate Files on Mac OS X
|
|
Google
says the best phishing scams have a 45-percent success rate
|
Manual
Phishing Gmail Attacks Found To Be Very Effective
|
Computer
Scientists Ask Supreme Court To Rule APIs Can't Be Copyrighted
|
Dealer-Installed
GPS Tracker Leads To Kidnapper's Arrest in Maryland
|
Verizon
May Soon Get to Enjoy a Lawsuit Over Its Sneaky Use of Perma-Cookies
|
11/6
|
Facebook Open Sources Its Proxygen
HTTP Framework And Server
|
Election
Day was just another chance to worry about security
|
Secure
Messaging Scorecard
|
Verizon:
ISPs will sue unless government adopts weaker net neutrality rules
|
Double
trouble for Apple, as two software security flaws discovered
Malware
Discovered In China Could Herald ‘New Era’ Of iOS And Mac Threats
|
|
Google
Drive Now Works Better With Desktop Applications
|
New
Technology And Big Data Help You Breathe Fresh Air
|
Cloud
Encoding Startup Encoding.com Gets Strategic Investment From Harmonic
|
PHISHING email NOT from ITHelpCentral
|
How
I
Reverse Engineered
Google Docs
|
|
Beep: More Wearable Tech
|
Startup
BigPanda Emerges to Shed Light on IT Incidents
|
I'm
Terrified of My New TV: Why I'm Scared to Turn This Thing on -- and
You'd Be, Too
|
Skyera
Crams 136TB Flash Capacity Into 1U Box
|
Amazon
Prime Members’ Newest Benefit Is Free, Unlimited Photo Storage
|
|
The
Best Hidden Features of VLC
|
How
The 49ers Are Using Beacons To Help You Find Hot Dogs And Beer
|
12
surprising ways personal technology betrays your privacy
|
Ethernet
is coming to cars
|
Logitech
debuts Surface-like keyboard for the iPad
|
|
The
scary side of Touch ID
|
Internet
Archive Brings 900 Classic Arcade Games To Your Browser. Here Are 7 Of
The Best
|
IT
Losing the Battle for Security in the Cloud
|
Amex
debuts token service
|
Study:
68 percent of healthcare breaches caused by loss or theft of devices,
files
|
A11/4
|
$300,000
for Cracking Telegram Encryption
|
Hackable
drone controller runs Linux
|
Microsoft
Now Lets Developers Run IE On Android, iOS And OS X
|
Apple
Partners With Southwest To Offer Free In-Flight Streaming Via Beats
Music
|
Cocoon Is
A Smart Home Security Device That Uses Infrasonic Sound To Detect An
Intruder
|
|
Microsoft
Teams Up With Dropbox
|
Verizon,
AT&T tracking their users with ‘supercookies’
|
Android
Lollipop: Taking mobile security to a new level
Lollipop
Review
|
Serious
security flaw in OS X Yosemite 'Rootpipe'
|
Cell
carrier was weakest link in hack of Google, Instagram accounts
|
|
Facebook
sets up 'dark web' link to access network via Tor
|
5
Brilliant Reasons To Look Forward To Fedora 21
|
New
version of Backoff detected, malware variant dubbed 'ROM'
|
Bypass
Resume Filters by Using Keywords From Your Job Listing
|
Is
Samsung Sliding Into Home Or Just Sliding?
|
|
How
To Safely Store A Password
LastPass
releases Open Source command line client
|
Google
Updates Gmail for Android with Support for All Email Providers
|
November
2014 Issue of Linux Journal: System Administration
|
Magic
Numbers: The Secret Codes that Programmers Hide in Your PC
|
Flaw in New
Visa Cards Would Let Hackers Steal $1M Per Card
|
|
How
To Read Non-Fiction Books In Record Time
|
Chinese
Hackers Mess With Texas By Attacking Fracking Firms
|
Nearly
half of California residents had online info exposed last year,
attorney general says
|
Hacker
proof your credit cards and bank account
|
In
Cybersecurity, The Weakest Link Is You
|
10/30
|
TrueCrypt
Is Back, But Should It Be?
|
Apple
Pay: The Pros and Cons of Using This Mobile Payment System
|
How
Inbox by Gmail Works, and How to Use It for More Productive Email
|
Shellshock
over SMTP attacks mean you can now ignore your email
|
Find
My Phone does just one thing but Samsung's messed it up
|
|
How
to Use Handbrake to Convert Any Video File to Any Format
|
Dangerous
Vulnerability Fixed In Wget
|
Planning
Considerations for BYOD and Consumerization of IT (Part 6)
|
Arrests
made after 'specialist malware' used in £1.6 million ATM heist
|
The Internet Archive
|
|
FTC
sues AT&T over misleading and deceptive use of ‘Unlimited’ data
plans
|
6
Superb Reasons Why You Should Use Linux For Programming
|
The
Perfect Server – CentOS 7 (Apache2, Dovecot, ISPConfig 3)
|
ISPConfig
How
to use ISPConfig and Seafile without manual file modifications
|
White
House hacked
|
|
Retailer-Backed
Apple Pay Rival CurrentC Has Been Hacked, Testers’ Email Addresses
Stolen
|
uBeam
Nabs $10 Million In Funding From Upfront Ventures To Make Wireless
Charging A Reality
|
Hackers
Are Using Gmail Drafts to Update Their Malware and Steal Data
|
Facebook,
Google, and the Rise of Open Source Security Software
|
Why
Microsoft loves Linux
|
|
Why
Taxing The Internet Is Stupid
|
The
Secret Powers of Chrome's Address Bar
|
Verizon
Launches Tech News Site That Bans Stories On US Spying
|
Windows 10
Gets a Package Manager For the Command Line
|
'Wasting
Time on the Internet' Is Now an Actual College Class
|
10/28
|
Security
Will Need Big Insight, Not Just Big Data
|
AT&T
Breaks The Apple SIM’s Best Feature, Locks It Down If You Pick AT&T
|
CurrentC
Is The Big Retailers’ Clunky Attempt To Kill Apple Pay And Credit Card
Fees
|
Create
a USB Password Stealer to See How Secure Your Info Really Is
|
If
you’d miss it, Tile it.
|
|
T-Mobile
quietly hardens part of its U.S. cellular network against snooping
|
Three
must-have capabilities for today's data warehouse environment
|
Linux
Forums Free ebooks (sometimes)
|
Verizon’s
‘Perma-Cookie’ Is a Privacy-Killing Machine
|
Building
A Raspberry Pi VPN Part One: How And Why To Build A Server
|
|
US
government probes medical devices for possible cyber flaws
|
Apple
Pay: 6 things to know
|
Some
Bank of America customers double-charged with Apple Pay
|
Apple
CEO Discusses Security With Chinese Government: State Media
|
Twitter
Says 'We're Getting Rid Of The Password'
|
|
Net
Tax Charged By Gigabyte Proposed In Hungary
|
Tom's
Hardware: Best Computer Monitors: October 2014
|
How
to Tap Your Network and See Everything That Happens On It
|
How
to Identify and Solve your Android Battery Problems
|
Ten
years of Ubuntu: How Linux’s beloved newcomer became its criticized king
|
|
Facebook
Launches Pseudonymous App “Rooms” That Lets You Create Forums About Any
Topic
|
How
to Hack Your Own Network and Beef Up Its Security with Kali Linux
|
Microsoft
attempts to improve Android with new 'Garage' apps
|
Useful
SystemD commands
|
Essential
security apps for your smartphone and tablet
|
10/23
|
FBI
Lied About How it Obtained Silk Road Server Location Says Security
Expert
|
NSA
Spying Seen Risking Billions in U.S. Technology Sales
|
Intel
chips could let US spies inside: expert
|
Tech
Companies and Government May Soon Go to War Over Surveillance
|
Abandoned
subdomains pose security risk for businesses
|
|
The
Always Up-to-Date Guide to Building a Hackintosh (OS X 10.10)
|
How
To Check If Your Mac or Linux Machine Is Vulnerable to Shellshock
|
How
To Check If Your Mac or Linux Machine Is Vulnerable to Shellshock
|
In
wake of Anonabox, more crowdsourced Tor router projects make their pitch
|
Apple
says hackers attacked iCloud
How
to Make Sure You're Visiting the Real iCloud Page
|
|
htop: better top for linux
& OSx
|
How
To Really Speed Up Your Computer – Common Myths & What To Do Instead
|
This
Seat-Back Screen Lets Airlines Swap in the Latest Tablet Tech
|
NOT
OK GOOGLE: Android images can conceal code
|
Ad-borne
Cryptowall ransomware is set to claim FRESH VICTIMS
|
|
Avast
Antivirus Was Spying On You with Adware (Until This Week)
|
What
You Should Know About the Amazon Kindle Voyage
|
Is
your home or office internet gateway one of '1.2 MILLION' wide open to
hijacking?
|
Google's new Security Key
naked
security, YubiKey
eweek,
LastPass
KrebsonSecurity
|
Windows 0-Day
Exploited In Ongoing Attacks
|
|
Here’s
Why Windows 8.1′s Encryption Doesn’t Seem to Scare the FBI
|
Hands
On With Google Inbox: Useful Email Triage Tools For A Mobile Workflow
|
Five
Best Linux Desktop Environments
|
Suspected
Staples breach
|
‘Spam
Nation’ Publisher Discloses Card Breach
|
10/21
|
Why
Apple Pay could even be a big deal for Android users
|
Shall we fork
Debian™?
|
E.T.
Phone Home?
|
A
Physical Key to Your Google Account
|
CAINE
Linux Distribution Helps Investigators With Forensic Analysis
|
|
How
to Uncover Blurred Information in Photographs
|
How
to Break Into a Computer (and Prevent It from Happening to You)
|
A
Smartwatch That Projects Buttons Onto Your Skin
|
FBI
Director Warns That Smartphone Encryption Will Come with Consequences
|
With
Laplock, You Get A Text Message When Somebody Unplugs Your Laptop
|
|
10
Trends Transforming Enterprise IT
|
Will.i.am's
Puls smartband lets you leave your phone at home
|
First
Apple-IBM enterprise products coming next month
|
Microsoft
Reportedly Gearing Up for Smartwatch Launch
|
Taking
a cue from science fiction, Microsoft demos 'universal translator'
|
|
Phone
Hackers Dial and Redial to Steal Billions
|
Shred-it
Helps Businesses Mitigate Information Security Threats
|
October
13, 2014
Office of Information Security Shares 5 Tips to Safely Using Social
Media
|
The
Top 5 Information Security Breaches No One Is Talking About
|
Stop
worrying about mastermind hackers. Start worrying about the IT guy
|
|
Snapchat
and other online services need to tighten security
|
‘Online
security’ need not be an oxymoron
|
A
Fire-Safety Nightlight That Offers a New Take on the Smart Home
|
Maybe
Better If You Don’t Read This Story on Public WiFi
|
Swift. A new language
that lets everyone build amazing apps
|
10/16
|
Webroot
SecureAnywhere Internet Security Plus (2015)
|
Poodle:
introducing another web bug that makes browsing less safe
Google:
SSL bug Naked
Security
|
Microsoft
Patches 3 Zero-day Vulnerabilities actively being Exploited in the Wild
|
Don't
forget to add Wireshark to your security toolkit
|
Architects
Create a 3-D Printed Column That Survives Earthquakes
|
|
This
new battery charges to 70% in two minutes, and lasts for 20 years
|
Amazon's
first brick-and-mortar store said to open in Manhattan
|
Drupal
SQL injection nasty leaves sites 'wide open' to attack
|
WordPress
vs Joomla vs Drupal + CMS “comparison chart”
|
Police
Departments Skirting Public Accountability By Using Private Foundations
To Obtain Controversial Surveillance Technology
|
|
The
Samsung Galaxy Note 4 Is A Nearly Perfect Mini Tablet
Wired:Noteworthy
|
How
To Improve Your Programming Career Opportunities
|
Shellshock
used to amass botnet and execute phishing campaign
|
First
Demonstration of Artificial Intelligence On a Quantum Computer
|
No,
Your iPhone Flashlight is NOT Spying On You
|
|
All
the National Chains That Offer Free Wi-Fi
|
The
best SSDs of 2014: A buyers guide
|
5
Killer Tricks to Get the Most Out of Wireshark
|
IT
Salary Survey 2014: How does your information technology salary stack
up?
|
OSX Yosemite
|
|
|
|
|
|
|
10/14
|
Nearly
7 Million Dropbox Account Passwords Allegedly Hacked
|
Dropbox
Denies It Was Recently Hacked
|
Dropbox
bug wipes some users' files from the cloud
|
Google
testing service to connect patients with doctors over video chat
|
Here’s
How Visa Plans to Keep Your Credit Cards Safe in Apple Pay
|
|
Edward
Snowden’s Privacy Tips: “Get Rid Of Dropbox,” Avoid Facebook And Google
|
Malware
'Mayhem' Follows Emergence of Shellshock Vulnerability
|
Samsung
Working On 60 GHz Wi-Fi Technology |
'A
motivated, funded, skilled hacker will always get in' – Schneier
|
With
This Tiny Box, You Can Anonymize Everything You Do Online
|
|
Revealed:
ISPs Already Violating Net Neutrality To Block Encryption And Make
Everyone Less Safe Online
|
Hackers
Reportedly Set to Leak 200,000 Stolen Snapchat Images |
Snapsaved
Takes Responsibility For Latest Snapchat Leak |
I
Want to Write Android Apps. Where Do I Start?
|
Kmart
apologizes to customers after month-long security breach
|
|
FACEPALM!
HP cert used to sign malware
|
Metageek
Wi-Spy + Chanalyzer 5
|
The
iPhone 6 Plus Wins The Longer Race
|
Where In
The US Are All The Coders?
|
Apple
Pay And Digital Currency Mean Time Is Running Out For Physical Cash
|
|
Snowden
Attacks “Anything Goes” Privacy Intrusions Of British Spy Agencies
|
Crapware
Finds a New Way to Trick Users to Install Browser Extensions
|
ChromeOS Will
No Longer Support Ext2/3/4 On External Drives/SD Cards
|
How
to improve Google+ immediately
|
Mailbox
email app for Mac opens beta to all users
|
10/9
|
Outsourced
Tech Jobs Are Increasingly Being Automated
|
Apple
Pay vs. Google Wallet: A Brief Competitive Comparison
|
Two
AT&T Data Breaches Draw Attention to Insider Access Issues
|
Compromised
WordPress sites increasingly used for phishing
|
Most
Popular Place to Buy Computer Parts: Newegg
|
|
Apple
iPhone 6 Shows Why Even Small Gains in Screen Size Matter
|
5
Exciting New Features in Linux 3.17
|
JPMORGAN
ATTACK: Developer’s password gave alleged Russian hackers broad access
to data
|
Linux
Command Line Cheat Sheet
|
Meet
the virtual patients training real doctors
|
|
US
Spy Programs May Break the Internet if Not Reformed, Google Leader Says
|
Adobe
spies on readers: 'EVERY page you turn, EVERY book you own' leaked back
to base
|
Apple’s
iPhone Encryption Is a Godsend, Even if Cops Hate It
|
Information
security experts: Act and protect charities online
|
Morrisey:
Be wary after JPMorgan Chase security breach
|
|
‘Unlawful’
WiFi hotspot blocking ruling highlights academic IT headaches
|
SkillFeed
|
'Electronic
blood' could power computers
|
Supercomputer
revolution: Meet HP’s The Machine – an all-in-one, mega-powerful
photonic device
|
Chrome:
ScriptSafe
|
|
Journey
into cryptography
|
Aussie
builds contactless card cloner app, shops at Woolies with fake card
|
Six
steps for you to fight credit-card hackers
|
Huge
Data Leak at Largest U.S. Bond Insurer
|
Save
Money On Your Smartphone Bill: Cut The Mobile Internet
|
10/7
|
Migrating
From Windows 7 To Ubuntu: The Ultimate Guide
|
Spotify
is Powered by Linux and Open Source
|
Select
seven to hold 'Internet reboot' keys
|
Report:
Apple Will Announce Its New iPads at an Event on Oct. 16
|
Report:
Advanced iOS Virus Targeting Hong Kong Protesters
|
|
The
Unpatchable Malware That Infects USBs Is Now on the Loose
|
10
Big Problems That Brought HP to a Decision to Split Up
|
Google
Is Working On A Gigantic, Shape-Shifting TV Screen
|
Hackers
Have Found A Flaw In Macs And Are Using It To Control 17,000 Apple
Computers ... Via Reddit
|
Plastc
wants to replace your entire wallet with a single card
|
|
How
to configure a host intrusion detection system on CentOS
|
Pinterest
Curates Its Own Content With New Weekly Collections Called “Pin Picks”
|
Visual
Basic Rises Again as a Document Malware Scripting Language
|
One In Three
Jobs Will Be Taken By Software Or Robots By 2025, Says Gartner
|
Details of
iOS and Android Device Encryption
|
|
MEGATech
Videos: Testing the Gapgate on Galaxy Note 4
|
Germs
at the Office Are Often Found on Keyboards and at Coffee Stations
|
The
Washington Post Is Now Free On Amazon Kindles
|
How
to Clear Your Google Search History on Android
|
Law
Enforcement Still Defending ComputerCOP: Says They'll Keep Distributing
It Until After Someone's Been Hurt
|
|
What
Is The Best News Reader App For Android?
|
Politicians
Cynically Using JP Morgan Hack To Try To Pass Laws To Diminish Your
Privacy
|
Washington
Post's Clueless Editorial On Phone Encryption: No Backdoors, But How
About A Magical 'Golden Key'?
|
Should
I Use Linux Or Windows? 3 Deal-Breaker Questions You MUST Answer
|
Computer
security sleuths hack the hackers
|
10/2
|
Give
up firstborn for free Wi-Fi? Some click "I agree"
|
Hackers
charged with Xbox One, Valve, Call of Duty data theft
|
EFF:
Security software distributed by cops is actually spyware in disguise
|
An
FBI informant led hacks against 30 countries—now we know which ones
|
Your
Inner Drone: The Politics of the Automated Future
|
|
New
OS X backdoor malware roping Macs into botnet
|
Self-Destructing
SSDs Will Nuke Themselves If You Text Them a Code Word
|
The
End Of Passwords? This Bracelet Unlocks Computers And Doors With Your
Heartbeat
|
YubiKey
|
Wireless Sensor
|
|
pogoplug |
pogoplug: safeplug
|
pogoplug: Private
Cloud
|
Liquipel: Waterproffing
|
sticknfind
|
|
onlycoin
|
Scottevest
|
Youtube:
multi-factor authentication
|
Shared
Inbox Front Pulls $3.1 Million To Optimize Your Email Workflow
|
Pebble
Gets A Permanent Price Cut, Plus Background Sleep And Activity Tracking
|
|
Path’s
Talk App Gets Updated So You Can Send Messages To Places
|
Reddit
Plans Its Own Cryptocurrency To Give Back To Its Users After $50
Million Raise
|
IFTTT: Recipe
Collections
|
Secure
Your Linux Desktop and SSH Login Using Two Factor Google Authenticator
|
How
to Avoid an iOS 8 Bug That’s Deleting iCloud Documents
|
9/30
|
Google
gives students unlimited cloud storage
|
Hong
Kong's pro-democracy protests spur growth for secure messaging apps
|
Nixie
is a wearable drone that captures your activities on the fly
|
Jetpack
Propels Running Soldiers Faster, Farther
|
‘Cloaking’
device uses ordinary lenses to hide objects across range of angles
|
|
Google:
Cloud Storage Comparision
|
Updated
Bash packages now available via Fedora updates
|
Learning Security
by playing Games
|
‘Stalker
app’ company CEO arrested, faces federal charges of conspiracy and
spyware marketing
|
iOS
8’s predictive QuickType keyboard found to suggest parts of your
passwords
|
|
Shellshock
Bug May Be Even Bigger Than Heartbleed: What You Need to Know
|
How
To Check If Your Mac or Linux Machine Is Vulnerable to Shellshock
|
AES-256
Is Not Enough: Breaking a Bootloader
|
IG
exposes information security gaps at federal, state health insurance
exchanges
|
Region
to spend $1b on information security this year
|
|
Awareness
of information security threats growing; but organizations struggle to
manage the risks
|
SANS
updates information security policy templates library
|
Why
Your Company Needs Both a CIO and a CISO
|
Meet Wedg,
Another Post-Snowden Personal Cloud Device
|
Super
Early Data Suggests iPhone 6 Is Outselling 6 Plus By A Lot
|
|
New
security flaw in iOS 8 and iOS 8.0.2 allows someone to break into your
iPhone unchallenged
|
eBay
And PayPal To Split Into Two Separate Companies
|
How
Apple Pay Could Change the Buying Experience
|
How
to Organize Your Linux File System for Clutter-Free Folders
|
IT
skills that are in demand, and those that will be
|
9/25
|
The
Guy Who Just Hacked Touch ID In The iPhone 6 Says It's Safe ... For Now
|
Serious
Bash Flaw Lets Attackers Hijack Linux and Mac Computers
|
'Bash'
Security Flaw in OS X Allows for Malicious Attacks on Devices and
Services
|
In
Heartbleed's wake, Bash shell flaw puts Linux, Mac OS users at risk
|
15
Insanely Great Tricks to Master Apple’s iOS 8
|
|
The
limits of Apple's iOS 8 privacy features
|
Is
Your E-ZPass Spying on You?
|
Biometric
Security And Bowie Knives
|
Five
Things To Do With Your Old iPhone
|
Data
Breach Bulletin: Home Depot, eBay, C&K Systems, Call of Duty &
Destiny
|
|
How
Apple Made Your iPhone 6 Much Less Likely To Be Stolen
|
Hacker
Hysteria: 5 Ways to Protect Yourself from Cyber Attacks
|
How
to create nested folders in iOS 8 (Video)
|
Seven
Websites That Support Two-Factor Authentication
|
IT
security shifts from prevention to resiliency
|
|
Five
Ways To Protect Yourself from Data Breaches
|
Apple’s
iPhone 6 is more durable, less breakable than iPhone 5S, Galaxy S5, One
M8
|
Oklahoma
Sheriff Accused Of Keeping Extensive Database On Citizens
|
Lesson
in Successful Disaster Planning
|
MAMP: My Apache – MySQL –
PHP
|
|
Why
are some hard drives more reliable than others?
|
Evolution
Of The Desk (1980-2014)
|
Netflix
deadlocked with broadcast regulator over "confidential" subscriber data
|
FBI:
Your real SECURITY TERROR? An ANGRY INSIDE MAN
|
Latest
Firefox and Thunderbird updates plug CRITICAL SSL vulnerability
|
9/23
|
Native
support for Netflix is coming to Linux
|
TrueCrypt
may have found new life under a new name
|
How
will iPhone 6's Wi-Fi calling, VoLTE affect enterprise networks?
|
Larry
Ellison steps aside as Oracle CEO, former HP exec Mark Hurd promoted
|
Apple
Pay security: Hope abounds, but questions linger
|
|
How
to install Joomla on Ubuntu 14.04
|
Apple
Watch Privacy Questioned by Connecticut AG
|
How
To Learn Programming Without All The Stress
|
Is
Smarter Technology Dumbing Down the Human Race?
|
How
to Set Up Family Sharing in iOS 8
|
|
What’s
The Real Difference Between A Gaming Laptop And Desktop?
|
eBay
takes flak for leaving rigged iPhone listing up for 12 hours
|
Schneier:
iOS 8 Security
|
Home
Depot breach totals: 56 million credit cards exposed, $62 million in
losses
|
TOR
users become FBI's No.1 hacking target after legal power grab
|
|
Square's
new cash register will take Bitcoin, Apple Pay and much more
|
Display
technology so advanced
it feels like magic
|
3D
printing expands to nearly 100 UPS Stores across the U.S.
|
Coin
adds new features, addresses security concerns for its credit-card
replacement
|
iOS
8 Is Here: 10 Reasons To Install It Right Away
|
|
Why
I don’t like Square
|
Android
L will have device encryption on by default
|
Three
Things Apple Can Do to Fix iCloud’s Awful Security
|
Anatomy
of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”
|
In
Defense Of Passwords
|
9/16
|
Laid
off from job, man builds tweeting toilet
|
A
Google Site Meant to Protect You Is Helping Hackers Attack You
|
For
Sale Soon: The World’s First Google Glass Detector
|
WikiLeaks
posts the software governments use to spy on dissidents
|
Secrecy
Locks Your Files in Encrypted, Password-Protected Vaults
|
|
Blinkist
Breaks Down Nonfiction Books into Easy 15 Minute Bites
|
Toward
a Childproof Internet
|
Digital
Literacy Is the Key to the Future, But We Still Don’t Know What It Means
|
What
the Apple Watch Says About Apple
|
Usenet
and government |
|
Malware
Distributed Through Twitch Chat Is Hijacking Steam Accounts
|
How To
Stay Anonymous Online In 2014
|
Audible
Security Flaw Lets Thieves Download Unlimited Free Audiobooks
|
How
Cybercriminals Attack Small Businesses — and 10 Ways to Stop Them
|
With
Tech Taking Over in Schools, Worries Rise
|
|
NSA
Hacks Corporate Servers To Map Internet
|
Comcast
Denies It Will Cut Off Customers Who Use Tor, The Web Browser For
Criminals
|
Top
10 Emerging Technologies That Are Changing The World
|
Apple
Sells 4M iPhone 6 And 6 Plus Pre-Orders In Opening 24 Hours
|
The
FBI just finished building its facial recognition system
|
|
SELinux
Coloring Book (Redhat)
|
Islamic
Hackers Attack Kirk Cameron Site
|
Five
million hacked passwords dumped on Russian cybercrime forums
|
lifehacker:
This Week's Top Downloads
|
Putting
Smartphone Zombies In Their Place
|
9/11
|
Hacked
Celeb Pics Made Reddit Enough Cash to Run Its Servers for a Month
|
Here’s
a $500 Dry-Cleaning Machine That Fits in Your Closet
|
The
iPhone 6's New Camera Could Forever Change Filmmaking
|
Battle
for the net: why is my internet slow today?
|
The
most important feature Apple didn't talk about today
|
|
http://map.ipviking.com/
|
Which
VPN Services take your Anonymity Seriously?
|
DNSCrypt
|
NSA
asked Linus Torvalds to install Backdoors in Linux
|
Why
Apple Devices Will Soon Rule Every Aspect of Your Life
|
|
Word-of-the-Day:
Google dork
|
Teamviewer
|
Tabnabbing:
A New Type of Phishing Attack
|
The
Start-to-Finish Guide to Securing Your Cloud Storage
|
Why
Meditation Should Be Your Brain's "Scheduled Maintenance"
|
|
Microsoft
Paid NFL $400 Million To Use Surface, But Announcers Call Them iPads
|
Code.org
Launches Code Studio, A Toolset And Curriculum For Teaching Kids
Programming
|
How
to Protect Yourself From Big Bank-Card Hacks
|
YouTube,
Amazon and Yahoo! caught in malvertising mess
|
Planning
Considerations for BYOD and Consumerization of IT (Part 3)
|
|
Facebook's
Messenger App Logs Way More Data Than You Realize
|
Facebook
Will Now Ask People Why They Hid An Ad, Banish Offensive Ones
|
Cyber
breaches rare among U.S. state-registered investment advisers -study
|
5
Ways to Protect your Business from a Cyber Attack
|
The
Fundamental Advantages Of Using A Chromebook
|
9/9
|
Most
Email Is Now Invisible To Hackers And Government Surveillance
|
This
Android Shield Could Encrypt Apps So Invisibly You Forget It’s There
|
Encrypting
Your Dropbox, SkyDrive, Box, or Google Drive On The Fly
|
World
First As Message Sent From Brain To Brain
|
Legal
Sifter
|
|
How Secure is my
Password
|
10,000
Top Passwords
|
Word
Lens
|
SplashTop
|
N.S.A.
Breached Chinese Servers Seen as Security Threat
|
|
18
things I
did after installing Fedora 20, the Xfce spin
|
How
to: Change / Setup bash custom prompt (PS1)
|
How
to Turn Your PlayStation 3 Into a Linux PC
|
Why
Everyone Should Read Harry Potter
|
CloudAlloy
Makes Docs In The Cloud More Secure By Breaking Them Into Pieces
|
|
The
System Administrator's Organized Backpack
|
Barbarians
At The Password Gate
|
Hackers
launch Apple ID phishing campaign playing on iCloud security worries
|
HealthCare.gov
breached, injected with malware
|
Kindle
vs. iBooks: Which Is The Best eReader For Your iPad or iPhone?
|
|
www.wired.com
|
Home
Depot Finally Confirms Its Payment System Was Hacked For Months
|
Comcast Using
JavaScript
Injection To Serve Ads On Public Wi-Fi Hotspots
|
PCMag:
Tips for Sharing Passwords
|
Use
home networking kit? DDoS bot is BACK... and it has EVOLVED
|
9/4
|
Logitech
K480 Multi-Devices Bluetooth Keyboard
|
How
to Save the Net
|
Mysterious
Phony Cell Towers Could Be Intercepting Your Calls
|
How
Apple and Amazon Security Flaws Led to My Epic Hacking
|
DIY NAS:
EconoNAS 2014
|
|
How
to make your email address as hard to guess as your password
|
The
Apps You Need to Deauthenticate Before Selling Your Devices
|
iCloud's
Two-Factor Authentication Doesn't Secure Your Photos, Backups
|
Linux
Systems
Infiltrated and Controlled In a DDoS Botnet
|
Plan
Your Free Online Education at Lifehacker U: Fall Semester 2014
|
|
Why
We Should Encrypt Everyone’s Email
|
Following
iCloud hack, experts say enterprise data likely at risk
|
Linux
Journal How-To
|
You
Got Your
Windows In My Linux
|
SysVinit
to Systemd Cheatsheet
|
|
Latest
Firefox adds protection against rogue SSL certificates
|
VoIP
Security. A Quick Guide for Small Business
|
Using
WPS on your Wi-Fi router may be even more dangerous than you think
|
Scared
of brute force password attacks? Just 'GIVE UP' says Microsoft
|
Mac
security packages range from peachy to rancid – antivirus tests
|
|
Data:
Nearly All U.S. Home Depot Stores Hit
|
Real-time
emotion detection with Google Glass: An awesome, creepy taste of the
future of wearable computers
|
HTG
Explains: What is a File System, and Why Are There So Many of Them?
|
5
Smart Home Appliances You Should Be Buying
|
Why
Social Engineering Should Be Your Biggest Security Concern
|
9/2
|
The
New Era Of Smart Dining
|
Windows
XP’s Market Share Fell By Less Than 1% In August
|
CNN:
Who hacked and
posted celebs nude pics?
|
This
could be the iCloud flaw that led to celebrity photos being leaked
(Update: Apple is investigating)
|
3
Reasons Why Chromebook Does Not Solve Digital Security Issues
|
|
Stop
Thieves From Recovering Your Data After A Factory Reset
|
Google’s
Location History is Still Recording Your Every Move |
Five
Facebook Threats That Can Infect Your PC, And How They Work
|
NIST
to sysadmins: clean up your SSH mess
|
Cybersecurity's
hiring crisis: A troubling trajectory
|
|
Flaw
lets hackers break your WiFi router's security with one guess
|
Why
Usernames & Passwords Are A Thing Of The Past, And How To Cope With
This
|
Amazon
Vs. Hachette: Fewer Middlemen Equals A Better World
|
Hacker
Attack on Banks Shows Need to Lock Down Employee PCs
|
What
Are Hackers Thinking?
|
8/28 |
3-Year
VPN Unlimited Premium Plan For $19 |
Cloud
Storage Showdown: Google Drive, Dropbox, iCloud and More Compared |
Heartbleed
Attacks Still Actively Targeting Vulnerable Servers, Says IBM |
Linux
hits 23 - the Time Machine that changed the world! |
The
New KDE Plasma 5 Desktop Is Gorgeous — Here’s How To Try It |
|
Go
On A Reading Buffet: 4 Top eBook Subscription Services Compared |
Dropbox
Upgrades Pro Users to 1TB, Adds Remote Wipe, Security Features |
5
Amazing 3D Printing Applications You Have to See to Believe |
The
top 10 personal cloud-storage services |
Free
1 Year of LastPass Premium |
|
If
You're A Copyright Maximalist 'Piracy' Must Be The Answer To All
Problems
|
The
Lifehacker Pack for Students
|
Researchers
camouflage haxxor traps with fake application traffic
|
Dairy
Queen
joins list of retailers hit by hacker attack
|
Firefox
OS app permissions will give users more privacy than Android
|
|
How
To Install Tomcat On CentOS 7
How
to install Tomcat in Ubuntu 14.04
|
FBI
Investigates
'Sophisticated' Cyber Attack On JP Morgan, 4 More US Banks
|
Nearly
70 percent of IT pros target of weekly phishing attacks, HP finds
|
Comparison
of Linux distributions
|
Samsung’s
New Gear S Smartwatch Features A Curved Screen And 3G Connectivity
|
|
"There
is no inside" - How to get the most from your firewall
|
Surface
Pro 3 vs. iPad Air: Best Option For You?
|
10
Free Online Courses That Every Professional Should Check Out
|
What's
the matter with PGP?
|
New
cybersecurity tool lets us predict website hacks before they happen
|
|
How
to Easily Encrypt Files on Windows, Linux, and Mac OS X
|
We
need to talk about email
|
White
House's Cybersecurity Guy Proud Of His Lack Of Cybersecurity Knowledge
Or Skills
|
default router
passwords
|
2014
IT's Hottest Certifications
|
|
|
|
|
|
|
|
2011 Spring |
2012 Spring |
2012
Fall |
2013 Spring |
2013
Fall
|
8/27
|
2010
Fall |
2011
Fall |
2008
Fall |
2010 Spring |
|