Linkmarks
Items waiting in the Pocket queue: 3055
The US military is investigating how technical data about a helicopter used in President Barack Obama's fleet was found on an Iranian computer.
2009-03-03
USA president helicopter peer to peer hackingAttrition.org is a computer security Web site dedicated to the collection, dissemination and distribution of information about the industry for anyone interested in the subject. They maintain one of the largest catalogs of security advisories, text files, and humorous image galleries. They are also known for the largest mirror of Web site defacements and their crusade to expose industry frauds and inform the public about incorrect...
A controversy surrounding the AACS cryptographic key arose in April 2007 when the MPAA and the Advanced Access Content System Licensing Administrator, LLC (AACS LA) began issuing demand letters to websites publishing a 128-bit number, represented in hexadecimal as 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0, which is one of the cryptographic keys for HD DVDs and Blu-ray Discs. The letters demanded the immediate removal of the key and...
A German computer scientist has published details of the secret code used to protect the conversations of more than 4bn mobile phone users.
2009-12-29
mobile phone encryption security hacking surveillanceInternet giant Google says it may end its operations in China after hackers targeted the e-mail accounts of Chinese human rights activists.
2010-01-13
Google hacking censorship security China human rightsThe holy grail is how can you distinguish between information which is garbage and information which is valuable.
2009-05-11
hacking China spying Tibet security Internet remote control eavesdropping sniffing