| 1. | | Malvertising Or Just Advertising? The Curious Case Of Counterclank (threatpost.com) |
| 2 points by TheloniusPhunk on Jan 30, 2012 | past |
|
| 2. | | Revamped Pwn2Own to Offer $105K in Prizes (threatpost.com) |
| 1 point by TheloniusPhunk on Jan 23, 2012 | past |
|
| 3. | | Bill Gates's Trustworthy Computing Memo: Ten Years Later (threatpost.com) |
| 2 points by TheloniusPhunk on Jan 12, 2012 | past |
|
| 4. | | Losing The Cops In A Foot Chase? There's An App For That (threatpost.com) |
| 2 points by TheloniusPhunk on Jan 5, 2012 | past |
|
| 5. | | Survey Suggest Most Americans are Media Pirates (threatpost.com) |
| 1 point by TheloniusPhunk on Jan 5, 2012 | past |
|
| 6. | | Lilupophilupop SQL Injection Attack Tops 1 Million Infected URLs (threatpost.com) |
| 1 point by TheloniusPhunk on Jan 4, 2012 | past |
|
| 7. | | Thinking About Software Security Holistically (threatpost.com) |
| 2 points by TheloniusPhunk on Dec 30, 2011 | past |
|
| 8. | | Quality Coding Takes A Break For The Holidays. But Why? (threatpost.com) |
| 3 points by TheloniusPhunk on Dec 20, 2011 | past |
|
| 9. | | Generation Y Won't Listen To IT (threatpost.com) |
| 2 points by TheloniusPhunk on Dec 15, 2011 | past |
|
| 10. | | Combination of Eyes and Algorithms Wins $50K Prize In DARPA's Shredder Challenge (threatpost.com) |
| 1 point by TheloniusPhunk on Dec 12, 2011 | past |
|
| 11. | | Insecure Applications: We Are The 84 Percent (threatpost.com) |
| 1 point by TheloniusPhunk on Dec 7, 2011 | past |
|
| 12. | | Twitter Acquires Mobile Security Firm WhisperSystems (threatpost.com) |
| 1 point by TheloniusPhunk on Nov 28, 2011 | past |
|
| 13. | | Was The 3 Character Password at Hacked Water Treatment Plant A Siemens Default? (threatpost.com) |
| 18 points by TheloniusPhunk on Nov 22, 2011 | past | 8 comments |
|
| 14. | | Facebook & Twitter Erode Your Co.'s Security From Within. Here's How To Stop It. (threatpost.com) |
| 1 point by TheloniusPhunk on Nov 10, 2011 | past |
|
| 15. | | Apple Trips Up Again on Security (threatpost.com) |
| 1 point by TheloniusPhunk on Nov 9, 2011 | past |
|
| 16. | | Apple Drops Researcher From Dev Program Over iOS Bug Demo App (threatpost.com) |
| 2 points by TheloniusPhunk on Nov 8, 2011 | past |
|
| 17. | | Government's Auditing Program For the Cloud Falling Behind Schedule (threatpost.com) |
| 1 point by TheloniusPhunk on Nov 3, 2011 | past |
|
| 18. | | Things to do when the Internet is down (imgur.com) |
| 1 point by TheloniusPhunk on Nov 2, 2011 | past |
|
| 19. | | Compromised WordPress Sites Redirecting to Black Hole Exploit Kit Servers (threatpost.com) |
| 1 point by TheloniusPhunk on Nov 2, 2011 | past |
|
| 20. | | Fortune 500 Gets "F" In Social Engineering Hacking Test (threatpost.com) |
| 2 points by TheloniusPhunk on Oct 31, 2011 | past |
|
| 21. | | Facebook Flaw Allows Users to Send Executables (threatpost.com) |
| 2 points by TheloniusPhunk on Oct 28, 2011 | past |
|
| 22. | | EFF Data Shows Five CAs Compromised Since June (threatpost.com) |
| 33 points by TheloniusPhunk on Oct 27, 2011 | past | 2 comments |
|
| 23. | | So many things moving/storing data, they don't even know what they're all doing (threatpost.com) |
| 1 point by TheloniusPhunk on Oct 27, 2011 | past |
|
| 24. | | Google Report Shows It Complied With 93% of U.S. Law Enforcement Data Requests (threatpost.com) |
| 3 points by TheloniusPhunk on Oct 25, 2011 | past |
|
| 25. | | Walking Among Security Giants (threatpost.com) |
| 2 points by TheloniusPhunk on Oct 25, 2011 | past |
|
| 26. | | New Research Shows Possibility of Using an iPhone as a Keylogger (threatpost.com) |
| 1 point by TheloniusPhunk on Oct 18, 2011 | past |
|
| 27. | | Informant Says Hacks, Threats Followed Release Of Occupy Wall Street E-Mail (threatpost.com) |
| 7 points by TheloniusPhunk on Oct 18, 2011 | past | 4 comments |
|
| 28. | | Inside a Hacker Forum (threatpost.com) |
| 1 point by TheloniusPhunk on Oct 17, 2011 | past |
|
| 29. | | It's Time For an Apple Patch Tuesday (threatpost.com) |
| 1 point by TheloniusPhunk on Oct 14, 2011 | past |
|
| 30. | | Thousands of Patients at Risk of ID Theft Following Genentech Breach (threatpost.com) |
| 2 points by TheloniusPhunk on Oct 13, 2011 | past |
|
|
| More |