The creator of Skype Trojan decided to publish the source code of his program that is able to intercept VOIP communications of Skype. Nice intentions but bad execution He pretends that his first goal is to allow antivirus software companies to update signatures to be able to detect it more easily. This trojan records your VOIP communications befo
Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute. How do they do? The attack gives hackers a way to read encrypted traffic sent between computers and certain types of routers that use the WPA (Wi-Fi Protected Access) encryption system. The attack was developed
Lots of users are moving their computing lives from the desktop to the cloud. They rely on hosted web applications to access emails, store photos and documents. But even if it comes with a lot of conv...
Registering for an account at any web site almost always requires an email address, and some people use a secondary address they don't care about instead of their real email address to avoid spam. I
It's been less than a week since Windows 7 was released to manufacturer and already we're seeing reports that Windows 7 RTM Ultimate has been cracked using an OEM product key from computer manufacture...
Current authentication methods proposed by payment schemes are a joke for fraudsters. Not only are the credentials information static, but also very easy to get on the web. The fact that the code is
It is not new to the experts, but SSL (Secure Socket Layer) is not as secure as it is supposed to be. The SSL security protocol is receiving a critical security update. This update does not concern
Apple just suggested to IETF (Internet Engineering Task Force) the HTTP Streaming to replace the RTSP (Real Time Streaming Protocol) and even Flash and Silverlight. HTTP Streaming The purpose of thi
This AFP survey (click to download pdf of report) makes clear a trend many have expected, that fraud would grow as the economy continues to suffer. And, no surprise, but larger organizations are a b...
The web 3.0 is on every mouth. It seems like it’s one of the next buzzes on the internet. What is it? What can we expect from it? Before describing the WEB 3.0, let’s go a little bit through the his
Log in to start a new blog
There are no top bloggers for the last 30 days.
There are no engaging bloggers for the last 30 days.
© Finextra Research 2014