Showing results 1 to 20 of 78

September 2, 2009 By Microsoft

Windows Live Messenger

Windows Live Messenger includes support for the im Initiative! Every time you start a conversation using im, Microsoft shares a portion...

July 22, 2015 By Cerulean Studios


Trillian is a free fully featured, stand-alone, skinnable chat client that supports chatting on Windows Live, Facebook, Yahoo, MySpace,...

May 29, 2012 by

How did everyone miss Flame?

The most "complex malware ever found" — Flame — has taken the information security world by surprise. Given that it is said to have been around for years, how did everyone miss it?

June 22, 2011

Book review: Surveillance or Security?

Over the last 20 years or so, there have been intermittent moves by the EU and the UK government to implement various levels of online surveillance — first by requiring ISPs to install equipment to facilitate wiretapping, and second by storing the masses of communications data created by all of us.

January 16, 2009 by

Legal concerns stop researchers from disrupting the Storm Worm botnet

What if security researchers were able to disrupt the leftovers of the Storm Worm botnet thanks to a flaw in its communication model allowing them to redirect infected hosts and eventually disinfect them, but fearing legal action have their hands tied?At the 25th Chaos Communication Congress, which took place in December, 2008, German researchers Georg Wicherski, Tillmann Werner, Felix Leder and Mark Schlösser, held a presentation (Stormfucker: Owning the Storm Botnet) demonstration their idea.

October 26, 2008 by

Fun headlines from last week

The big security news last week wasn't that there's another WIndows worm poking its head up - it was that a bunch of academics have proven they can read your password data as you type it from variations in the electrical signals produced by your keyboard - through walls, and from sixty-five feet away.

October 9, 2008 by

Toshiba touts Quantum Key Distribution

Toshiba research scientists have developed a method of distributing quantum keys more efficiently, the company has claimed in a statement:"[Quantum Key Distribution -- ] QKD -- relies on sending encoded single photons (particles of light) along the fibre. Any attempt by a hacker to intercept these photons scrambles their encoding, alerting the users that their key is not secret.


You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All

Most Popular