Quantcast
Channel: Quality and security of information systems »» opera
Browsing latest articles
Browse All 30 View Live

Serious security holes fixed in Opera – but Mac App Store users left at risk...

Serious security holes fixed in Opera – but Mac App Store users left at risk again | Naked Security.

View Article



Security and Privacy in Healthcare IT Special track in The 26th International...

Dear all, the paper submission deadline of CBMS 2013 was extended along with its special tracks. Therefore the new deadline for paper submission of SPH2013 (a special track of the CBMS 2013) was also...

View Article

The 2013 World Congress in Computer Science, Computer Engineering, and...

CALL FOR PAPERS Paper Submission Deadline: March 18, 2013 The 2013 World Congress in Computer Science, Computer Engineering, and Applied Computing July 22-25, 2013, Las Vegas, USA WORLDCOMP’13...

View Article

Syndie

Syndie is an open source system for operating distributed forums (Why would you use Syndie?), offering a secure and consistent interface to various anonymous and non-anonymous content networks. via...

View Article

Opera network cracked • The Register

Opera network cracked • The Register.

View Article


Is DEF CON right to ask the feds to stay away? [POLL] | Naked Security

The founder of the DEF CON hacker conference has announced that members of the U.S. federal government will not be welcome to attend this year’s event. DEF CON is one of the world’s largest hacker...

View Article

Seminar: Naim Qachri “Presentation of the Galois/Counter Mode of Operation...

March 18, 2014 – 12.45 – Computer Department Seminar Room – NO Building, 8th floor (2N8.202) Speaker : Naim Qachri (ULB) Title : Presentation of the Galois/Counter Mode of Operation (GCM)

View Article

Secure webmail service Lavabit suspends operation, citing legal issues |...

Secure webmail service Lavabit suspends operation, citing legal issues | Naked Security.

View Article


Top 10 Secure Coding Practices – Secure Coding – CERT Secure Coding Standards

Top 10 Secure Coding Practices Validate input. Validate input from all untrusted data sources. Proper input validation can eliminate the vast majority of software vulnerabilities. Be suspicious of most...

View Article


GostCrypt

The Gostcrypt project has been launched at the end of 2013 as fork of the (late) Truecrypt project. Snowden’s leaks have made clear more than ever that the massive use of encryption by citizens must...

View Article

Malwr – Malware Analysis by Cuckoo Sandbox

What is Malwr? Malwr is a free malware analysis service and community launched in January 2011. You can submit files to it and receive the results of a complete dynamic analysis back. Mission Existing...

View Article

Watch That Windows Update: FTDI Drivers Are Killing Fake Chips

The FTDI FT232 chip is found in thousands of electronic baubles, from Arduinos to test equipment, and more than a few bits of consumer electronics. It’s a simple chip, converting USB to a serial port,...

View Article

KeySweeper

KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from any...

View Article


To Avoid Detection, Terrorists Made Messages Seem Like Spam – Slashdot

HughPickens.com writes: It’s common knowledge the NSA collects plenty of data on suspected terrorists as well as ordinary citizens, but the agency also has algorithms in place to filter out information...

View Article

cSploit/android · GitHub

cSploit – The most complete and advanced IT security professional toolkit on Android. cSploit is an Android network analysis and penetration suite which aims to offer to IT security experts/geeks the...

View Article


DNS leak test

What is a DNS leak and why should I care? When using an anonymity or privacy service, it is extremely important that all traffic originating from your computer is routed through the anonymity network....

View Article

CALL FOR PAPERS | eDemocracy

CALL FOR PAPERS | eDemocracy.   e-Democracy 2015: Citizen rights in the world of the new computing paradigms 6th International Conference on e-DemocracyCALL FOR PAPERS December 10-11, 2015, Athens,...

View Article


Image may be NSFW.
Clik here to view.

Teaching Encryption Soon to Be Illegal in Australia

Under the Defence Trade Control Act (DTCA), Australians could face up to ten years in prison for teaching encryption. Criminal charges will go into effect next year. The new legislation will make it...

View Article

Image may be NSFW.
Clik here to view.

MIG: Mozilla InvestiGator by mozilla

Mozilla’s platform for real-time digital forensics and incident response of modern infrastructures MIG is a platform to perform investigative surgery on remote endpoints. It enables investigators to...

View Article

Major Flaw In Android Phones Would Let Hackers In With Just A Text

A security gap on the most popular smartphone operating system was discovered by security experts in a lab and is so far not widely exploited. It would let malicious code take over a phone instantly....

View Article
Browsing latest articles
Browse All 30 View Live




Latest Images