This is Candice Craig's official app. This app lets you communicate directly with Candice and lets her communicate with you as well....
Showing results 1 to 20 of 122
Almost two months after Google's security team revealed a major security flaw in SSLv3, an Australian government department was found to still be using the old protocol on at least one of its websites, leaving it wide open to POODLE-like attacks.
Siemens is impressed at what Israeli security startups CyActive can do – developing ways of mitigating attacks before they can take place.
More than one million Orange customers face an increased risk of phishing attacks after hackers broke into a marketing platform.
Cyber attacks post a greater threat than terrorism, suggests one Juniper Networks exec. But public apathy seems to be overshadowing the severity of the situation.
Cisco says credit card data is more susceptible to interception while stored at the point-of-sale terminal, thus leaving the door open for attacks like the one on Target.
Dont step on it Play two mode time and attack.One Rule: Avoid White TilesAn addicting game that tests your reflexes against time and...
The hacking comes one week after a wave of cyberattacks against over 170 Australian sites, mainly belonging to small businesses. The attacks were in retaliation against Australia for reportedly using its Jakarta embassy for spying.
With two operating system developers experiencing attacks on the same weekend, one has opened up, shared exactly what it knows, and returned its services to life, while the other has stayed silent.
The hardest most addictive game in the world - Fact(well, not readlly a fact, but try it, you will see!) It's simple, try to get a...
Major U.S. banks continue to be hit by online attacks. Capital One is the latest to be hit by a denial of service attack, though the bank said customer data is thought to be safe.
Today, one of Microsoft's Technical Fellows has published his second "geek lit" novel, Trojan Horse. It's a techno-thriller with educational value because it aims to get the technical details of global cyber-attacks right
The Power Pwn may look like a power strip, but it's actually a DARPA-funded hacking tool for launching remotely-activated Wi-Fi, Bluetooth, and Ethernet attacks. If you see one around the office, make sure to ask if it's supposed to be there.
UK information security incidents are at an all-time high, and are costing UK businesses billions per year, according to auditing house PricewaterhouseCoopers.Hacks, attacks, and insider data mistakes cost the UK between £5bn and £10bn last year, according to PwC One Security partner Chris Potter — who added the proviso that the figure needed to be taken with a pinch of salt due to difficulties in quantifying that kind of loss.
Anonymous has hacked and executed Distributed Denial of Service (DDoS) attacks against official and fan-created Formula 1 websites. The group is protesting the Formula 1 Grand Prix in Bahrain.
Apple releases patch Thursday to curb Flashback malware, but one analyst says platform likely to come under "deep scrutiny" by cybercriminals and this could lead to more attacks in future.
Only one of the bulletins will carry a critical rating because of the risk of remote code execution attacks on the Windows operating system.
Transaction-signing tokens help mitigate emerging social engineering attacks, observers say, with one adding that banks should continue investing in security systems refresh.
The Japanese government has been quietly developing a cyberweapon since 2008, which reportedly is able to track, identify and disable sources of online attacks, one report stated.
Microsoft .NET is one of several programming languages vulnerable to elevation of privilege attacks.
Malware seldom repeated and often considered more a nuisance than one with serious effects on users, but such attacks will increase with smartphone adoption and transaction devices, warns new report.
Web sites function as passive data grabbers or launch pads for active attacks such as man-in-the-middle exploits, say observers, with one noting these threats rising in Asia-Pacific.
Only one percent of security vulnerability exploits in the first half of the year were attacks against so-called zero-day flaws, Microsoft has said.According to the software giant, 99 percent of exploits use common techniques such as social engineering and the targeting of unpatched, known vulnerabilities.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)