Warning: file_put_contents(): Only 0 of 24618 bytes written, possibly out of free disk space in /var/www/html/includes/framework.php on line 1495 Call Stack: 0.0001 625016 1. {main}() /var/www/html/categories.php:0 2.4327 1496056 2. Cache->save() /var/www/html/categories.php:68 2.4395 1520904 3. file_put_contents() /var/www/html/includes/framework.php:1495 BrainCan - security

security

Home / Categories / security

Search category post



intel updates true key app to simplify security

intel updates true key app to simplify security

Intel Security,a wholly owned subsidiary of Intel (and previously known as McAfee) has updated its...


Read more
微軟啟動企業資安防護網

微軟啟動企業資安防護網

微軟啟動企業資安防護網二大安全單位、四大新解決案...


Read more
apple wants to make the iphone smarter without...

apple wants to make the iphone smarter without...

It wasn’t an individual product or service that stole the spotlight at Google I/O this year,but...


Read more
online poker virus lets cybercriminals peek at...

online poker virus lets cybercriminals peek at...

Online poker players beware: there may be someone at your table looking at your cards,and they’re...


Read more
hackers cash out directly from atms, don t need to...

hackers cash out directly from atms, don t need to...

Hackers looking to steal money from ATMs have targeted your credit cards for years,trying to obtain...


Read more
capital one is working to fix my biggest annoyance...

capital one is working to fix my biggest annoyance...

Online banking can make life more convenient although it does come with annoyances of its...


Read more
security agency offers $3 million for ios 9...

security agency offers $3 million for ios 9...

In an initiative dubbed The Million Dollar iOS 9 Bug Bounty,Zerodium CEO Chaouki Bekrar is offering...


Read more
meet cujo, the device that promises  business...

meet cujo, the device that promises business...

You have so many different devices in your domestic now that you might have a tough time keeping...


Read more
dsei: tech hunts concealed threats to better...

dsei: tech hunts concealed threats to better...

novel tech could be coming to an airport near you to assist keep you safe. Unveiled for the first...


Read more
scary, sophisticated malware found attacking cisco...

scary, sophisticated malware found attacking cisco...

Internet-connected devices aren’t having a great week so far. After reports detailed...


Read more
good job, tsa: anyone with a 3d printer can make a...

good job, tsa: anyone with a 3d printer can make a...

In spite of the many security policies it enforces,the TSA isn’t really on top of its game when it...


Read more
how the nsa broke encryption on trillions of...

how the nsa broke encryption on trillions of...

Some Edward Snowden leaks maintain revealed that the NSA and other intelligence agencies can shatter...


Read more
its the year 2020...hows your cybersecurity?

its the year 2020...hows your cybersecurity?

What if,in 2020, wearable devices did not care approximately how many steps you took, and instead...


Read more
breaking up a botnet - how ramnit was foiled

breaking up a botnet - how ramnit was foiled

In the online world,crime is rife (abundant or plentiful, full of sth bad or unpleasant). Criminals...


Read more
mac malware hit all time high in 2015

mac malware hit all time high in 2015

Historically,the Mac has been much less prone to various types of malware attacks than Windows...


Read more
evil android porn app snaps your picture, holds...

evil android porn app snaps your picture, holds...

whether you’re someone who loves both pornography and sideloading Android apps,then you’re going...


Read more
corporate responsibility plays a significant part...

corporate responsibility plays a significant part...

Intel is committed to Corporate Responsibility. While we strive to ‘effect the right thing’ for...


Read more
nypd has some scary sounding x ray vans - and it s...

nypd has some scary sounding x ray vans - and it s...

The New York Police Department has equipped x-rays in some of its vans but it’s refusing to talk...


Read more
popular belkin wi fi router has numerous security...

popular belkin wi fi router has numerous security...

Led by Joel Land,security researchers from Carnegie Mellon University’s Computer Emergency...


Read more
ipas: security advisories for may 2020

ipas: security advisories for may 2020

Hi everyone,It’s the moment Tuesday in May 2020 and today we are not releasing any modern security...


Read more
chip shot: intel security named leader gartner...

chip shot: intel security named leader gartner...

Intel Security today announced that for the 9th consecutive time main research firm Gartner,Inc. has...


Read more
hundreds of ios apps in the chinese market found...

hundreds of ios apps in the chinese market found...

upright on the heels of a major malware attack on the App Store,mobile analytics service SourceDNA...


Read more
microsoft is ready to save your pc from huge...

microsoft is ready to save your pc from huge...

TeslaCrypt doesn’t mean anything to many PC users,but there are thousands of people who absorb...


Read more
window snyder s new startup thistle technologies...

window snyder s new startup thistle technologies...

The Internet of Things has a security problem. The past decade has seen wave after wave of unique...


Read more
ipas: security advisories for june 2020

ipas: security advisories for june 2020

Hi everyone,It’s the moment Tuesday in June, and nowadays we are releasing 5 new security...


Read more
get medieval on intruders with this retractable...

get medieval on intruders with this retractable...

There are lots of ways to prevent people from trespassing on your property,including moats,...


Read more
microsoft exec says u.s. tech firms must clarify...

microsoft exec says u.s. tech firms must clarify...

"whether other places in the world don’t understand how the U.S. government works and thinks that...


Read more
what is https and why do we need it?

what is https and why do we need it?

With web security growing more important,it makes sense to start taking those additional precautions...


Read more
chad and his colleagues in the diplomatic security...

chad and his colleagues in the diplomatic security...

Chad and his colleagues in the Diplomatic Security Service​ work together to ensure that the U.S....


Read more
recred project takes device centric access control...

recred project takes device centric access control...

With e-commerce now exceeding 1 trillion USD per annum,the sharing economy on the rise, and the...


Read more
microsoft partners with nato to shore up european...

microsoft partners with nato to shore up european...

Microsoft is a long-term partner for many governments around the world seeking to build a secure...


Read more
intel announces the winners of the inaugural...

intel announces the winners of the inaugural...

As section of Intel’s ongoing commitment to security,we collaborate closely with and support...


Read more
ipas: security advisories for july 2020

ipas: security advisories for july 2020

Hi everyone,For July, we are not releasing any modern security advisories. The next scheduled...


Read more
the rise in cyber attacks shows we need to change...

the rise in cyber attacks shows we need to change...

You are now 20 times more likely to have your money stolen online by a criminal abroad than by a...


Read more
u.s. cio tony scott defends security check plan...

u.s. cio tony scott defends security check plan...

At a House hearing Thursday,Tony Scott faced wrathful lawmakers who objected to plans for a novel...


Read more
security awareness: phishing up the weakest links!

security awareness: phishing up the weakest links!

Who (in their right intellect) would like to seem as the corporate dunce who infected their company...


Read more
the evidence that north korea hacked sony is...

the evidence that north korea hacked sony is...

nowadays Sony canceled the premiere of "The Interview" and its entire Christmas-Day release of the...


Read more
the quickest way to find out if youve been hacked

the quickest way to find out if youve been hacked

It’s easy to become desensitized to the never-ending procession of data hacks in news...


Read more
global study reveals businesses and countries...

global study reveals businesses and countries...

Intel Security,in partnership with the middle for Strategic and International Studies (CSIS), has...


Read more
commonly used strategy for website protection is...

commonly used strategy for website protection is...

Cloud-based security providers commonly use DNS redirection to protect customers' websites. The...


Read more
i just lost my job today. . .

i just lost my job today. . .

Updated on January 7,2015: On Tuesday afternoon while driving to Grants Pass, I received a phone...


Read more
threats and thresholds - securing europe s...

threats and thresholds - securing europe s...

In February 2013,the European Commission proposed a Network and Information Security (NIS) Directive...


Read more
dod s new  transparent  policy on cybersecurity is...

dod s new transparent policy on cybersecurity is...

When the U.S. Secretary of Defense Ashton Carter laid out the Pentagon’s new cybersecurity...


Read more
ipas: security advisories for september 2020

ipas: security advisories for september 2020

Hi everyone, nowadays we are releasing four security advisories addressing 9 vulnerabilities that...


Read more
in science essay, professor says fbi approach to...

in science essay, professor says fbi approach to...

In an essay to be published on June 17,2016 in Science magazine Susan Landau, professor of...


Read more
security flaws found in three state health...

security flaws found in three state health...

Federal investigators found meaningful cybersecurity weaknesses in the health insurance websites of...


Read more
five ways to become a smaller target for...

five ways to become a smaller target for...

Hacking for ransom is on the rise—on pace to defeat out last year's figures—and hits people...


Read more
researchers find vulnerability in two factor...

researchers find vulnerability in two factor...

Two-factor authentication is a computer security measure used by major online service providers to...


Read more
first technology to detect back and forth type...

first technology to detect back and forth type...

Fujitsu nowadays announced the development of technology that utilizes its artificial intelligence...


Read more
apple addresses privacy questions about  hey siri ...

apple addresses privacy questions about hey siri ...

 Though Apple has long been vocal approximately its stance on security and privacy,it has recently...


Read more
台灣微軟 2015 年 5...

台灣微軟 2015 年 5...

台灣微軟發佈 2015年 5 月份的資訊安全公告,本次的資安全公告有 13...


Read more
rsa agrees to replace security tokens after...

rsa agrees to replace security tokens after...

Nearly three months after RSA Security was breached by hackers,the company has announced it will...


Read more
stop opera s new vpn from leaking your ip address

stop opera s new vpn from leaking your ip address

Last week,Opera added a VPN to the dev version of its browser , which was certainly suited news. The...


Read more
common software would have let fbi unlock shooters...

common software would have let fbi unlock shooters...

The county government that owned the iPhone in a high-profile legal battle between Apple Inc. and...


Read more
the top 5 it security threats for 2016

the top 5 it security threats for 2016

IT security threats for 2016 will be amplifying many of the cyberthreats that we absorb seen prevail...


Read more
the darknet hell forum timeline revisited

the darknet hell forum timeline revisited

Back in April of this year I wrote approximately the AdultFriendFinder data breach: Hacked! How safe...


Read more
that ashley madison  thing

that ashley madison thing

I made it though the AdultFriendFinder’s (AFF) craze,barely… I am not the type of person that...


Read more
countdown for those infected by dnschanger malware...

countdown for those infected by dnschanger malware...

final November the FBI arrested six Estonian hackers in a raid called “Operation Ghost Click”...


Read more
ipas: security advisories for october 2020

ipas: security advisories for october 2020

10/15/2020 Update: while many Linux distributions have updated or are in the process of updating,a...


Read more
fbi director says you should cover your webcam...

fbi director says you should cover your webcam...

Do you cover your webcam with tape or a sticker? stamp Zuckerberg does . It’s used to guard...


Read more
shedding the fat: onr explores ways to trim...

shedding the fat: onr explores ways to trim...

Have you ever upgraded your software program or app,only to find it didn't seem to perform as...


Read more
get started: small businesses at risk for...

get started: small businesses at risk for...

Small businesses' inability or failure to deal with their vulnerability to cyber criminals puts...


Read more
social engineering exploits networks weakest...

social engineering exploits networks weakest...

It requires a lot of effort and expense for computer hackers to program a Trojan virus and...


Read more
google boss backs apple in encryption battle with...

google boss backs apple in encryption battle with...

Google chief Sundar Pichai on Wednesday expressed his support for Apple in its standoff with the FBI...


Read more
introducing cloudflare registrar: designed for...

introducing cloudflare registrar: designed for...

At CloudFlare,we’ve constructed one of the world’s largest networks purpose-built to protect our...


Read more
researchers devise method to safely share password...

researchers devise method to safely share password...

An unlucky reality for cybersecurity researchers is that genuine-world data for their research too...


Read more
us would let apple keep software to help fbi hack...

us would let apple keep software to help fbi hack...

The Obama administration told a U.S. justice of the peace judge on Friday it would be willing to...


Read more
why you should consider freezing your credit...

why you should consider freezing your credit...

Freeze your credit reports before you get burned. That's the message from security experts,...


Read more
facebook now warns users if they re a target of...

facebook now warns users if they re a target of...

 Years after Google implemented a similar feature for Gmail users,Facebook says it will inaugurate...


Read more
dell files ipo for cybersecurity unit

dell files ipo for cybersecurity unit

 Dell Inc. has filed confidentially for an IPO for its SecureWorks cybersecurity unit,TechCrunch...


Read more
healthcare sector is finding ways to minimize...

healthcare sector is finding ways to minimize...

Did you know that the healthcare industry is a far easier target for hackers to invade than banking...


Read more
travel: using wi fi in flight?

travel: using wi fi in flight?

When you are 30000 feet in the air and your flight offers Wi-Fi,are you really thinking...


Read more
what we know about the new u.s. sanctions against...

what we know about the new u.s. sanctions against...

S. Sanctions Against North Korea In Response to Sony Hack">On Friday, President Obama signed an...


Read more
intel after mcafee: hardware enabled security to...

intel after mcafee: hardware enabled security to...

We’ve all read the recent headlines and seen the alarming statistics. According to Cybersecurity...


Read more
hacker builds a qr code generator that lets him...

hacker builds a qr code generator that lets him...

Nowhere is the distinction between the haves and occupy-nots more apparent than when waiting for a...


Read more
a crash course in ransomware and how to protect...

a crash course in ransomware and how to protect...

Ransomware is particularly damaging malware,where attackers either disable systems or encrypt your...


Read more
worst case scenario for grid outage due to...

worst case scenario for grid outage due to...

While there maintain been dire warnings about cyberattacks causing power outages for months,the...


Read more
us: probable cause that locked phone has evidence...

us: probable cause that locked phone has evidence...

A locked iPhone used by one of the San Bernardino killers likely holds evidence of the eventual...


Read more
experts: the fbis iphone unlocking plan for apple...

experts: the fbis iphone unlocking plan for apple...

In its battle with Apple over an extremist's iPhone,the FBI says neither the company nor anyone...


Read more
security news this week: if the patriot act...

security news this week: if the patriot act...

Every weekend,WIRED Security rounds up the security vulnerabilities and privacy updates that...


Read more
safari browser redirects on iphone, ipad - check...

safari browser redirects on iphone, ipad - check...

Safari browser redirects became an obnoxious problem a few weeks back,when both my iPhone and iPad...


Read more
finding the next iphone hack could net you $1.5...

finding the next iphone hack could net you $1.5...

Cracking the iPhone might be harder to do these days,but that only makes it more valuable. On...


Read more
stop turning off your lock screen, use android...

stop turning off your lock screen, use android...

Regularly locking your phone’s screen can be an annoyance. So much so that a third of Android...


Read more
opera introduces a free vpn, built right into its...

opera introduces a free vpn, built right into its...

Windows/Mac/Linux: Opera users just got a free,unlimited VPN you can use to encrypt your data or...


Read more
records of 15 million t mobile customers swept up...

records of 15 million t mobile customers swept up...

 T-Mobile announced on Thursday the personal information of approximately 15 million customers was...


Read more
us used zero day exploits before it had policies...

us used zero day exploits before it had policies...

A a original document sheds light on the backstory behind the development of the government’s...


Read more
health insurer anthem is hacked, exposing millions...

health insurer anthem is hacked, exposing millions...

Apparently the data breaches of Target, Sony, or domestic Depot and a host of others weren't...


Read more
feds charge 8 alleged mules in $45 million global...

feds charge 8 alleged mules in $45 million global...

Eight suspects have been charged in modern York for their role a global cybercrime ring that...


Read more
hackers breached adobe server in order to sign...

hackers breached adobe server in order to sign...

The ongoing security saga involving digital certificates got a recent and disturbing wrinkle on...


Read more
answers being sought from facebook over latest...

answers being sought from facebook over latest...

Facebook’s lead data protection regulator in the European Union is seeking answers from the tech...


Read more
extortion extinction: researchers develop a way to...

extortion extinction: researchers develop a way to...

Ransomware - what hackers use to encrypt your computer files and demand money in exchange for...


Read more
team discovers how mobile ads leak personal data

team discovers how mobile ads leak personal data

The personal information of millions of smartphone users is at risk due to in-app advertising that...


Read more
health care needs to do a better job encrypting...

health care needs to do a better job encrypting...

Health-care organizations need to finish a better job of encrypting sensitive personal information...


Read more
govt declares 22 clinton emails top secret

govt declares 22 clinton emails top secret

The Obama administration confirmed for the first time Friday that Hillary Clinton's unsecured...


Read more
state department declares 22 clinton emails top...

state department declares 22 clinton emails top...

The Obama administration has confirmed for the first time that Hillary Clinton's home server...


Read more
security update for wordfence

security update for wordfence

An notable security update has been released for the WordFence Security...


Read more
cyberextortion ups the ante

cyberextortion ups the ante

With everything that has been occurring upon the treacherous terrain of the cyberthreat landscape...


Read more
hacking your facebook inbox

hacking your facebook inbox

How easy is it to hack your Facebook inbox? I could effect it in five minutes. All I need to effect...


Read more
[slashdot] hackers dump millions of records from...

[slashdot] hackers dump millions of records from...

(#41131349) I consider it a protest against cross security…… The dumps are posted...


Read more
google prompt lets you use two factor...

google prompt lets you use two factor...

Android/iOS: Most two-factor authentication methods—which you should be using as much as possible...


Read more
researchers uncover government spy tool used to...

researchers uncover government spy tool used to...

Piecing together modern information from various researchers, it's clear the 'Regin"...


Read more
flaw in new  secure  credit cards would let...

flaw in new secure credit cards would let...

According to researchers, the card system developed by VISA for utilize in the United Kingdom can be...


Read more
maker of smart grid control software hacked

maker of smart grid control software hacked

The maker of an industrial control system designed to be used with so-called smart grid networks...


Read more
devil s mountain: nsa s abandoned cold war...

devil s mountain: nsa s abandoned cold war...

At the height of the Cold War, a hill in West Berlin known as Teufelsberg (satan's Mountain)...


Read more
the war over the us government s unreleased...

the war over the us government s unreleased...

Even as President Obama denounces the “enhanced interrogation” employed by the CIA and outlined...


Read more
hacker lexicon: what counts as a nation s critical...

hacker lexicon: what counts as a nation s critical...

When Sony was hacked in 2014,many were surprised that the government considered it critical...


Read more
new ways your smartwatch (and phone) may be spying...

new ways your smartwatch (and phone) may be spying...

A computer science Masters student Tony Beltramelli at the IT University of Copenhagen has...


Read more



Warning: Unknown: write failed: No space left on device (28) in Unknown on line 0 Warning: Unknown: Failed to write session data (files). Please verify that the current setting of session.save_path is correct (/tmp) in Unknown on line 0