Items waiting in the Pocket queue: 820

Enter one or more words
Enter one or more words
Enter one or more words is a computer security Web site dedicated to the collection, dissemination and distribution of information about the industry for anyone interested in the subject. They maintain one of the largest catalogs of security advisories, text files, and humorous image galleries. They are also known for the largest mirror of Web site defacements and their crusade to expose industry frauds and inform the public about incorrect...
 cryptography hacking Internet security computer
More than one third of websites in the West African country of Cameroon pose a security risk to surfers according to a new report. Web addresses for Cameroon end ".cm" - attracting careless web users who wrongly type ".com"...
 security toread Cameroon top level domain SPAM
The US has introduced tougher screening rules for passengers arriving by air from 14 nations which the authorities deem to be a security risk. Travellers from Nigeria, Pakistan, Syria, Iran, Sudan, Yemen and Cuba will be among those facing body pat-down searches and carry-on baggage checks. It follows an alleged attempt to blow up a plane on Christmas Day.


 security air travel discrimination USA
A German computer scientist has published details of the secret code used to protect the conversations of more than 4bn mobile phone users.


 mobile phone encryption security hacking surveillance
Internet giant Google says it may end its operations in China after hackers targeted the e-mail accounts of Chinese human rights activists.


 Google hacking censorship security China human rights
The German government has warned web users to find an alternative browser to Internet Explorer to protect security.


 Internet Explorer browser security Germany Microsoft hacking
The holy grail is how can you distinguish between information which is garbage and information which is valuable.


 hacking China spying Tibet security Internet remote control eavesdropping sniffing
One unique aspect of reCAPTCHA is that data collected from the service is used to improve the process of scanning text, such as from books or newspapers. By using reCAPTCHA, you're not only protecting your site from spammers; you're helping to digitize the world's books...


 Google CAPTCHA SPAM security book digitization scanning
A 17-year-old bug in Windows will be patched by Microsoft in its latest security update. The February update for Windows will close the loophole that dates from the time of the DOS operating system. First appearing in Windows NT 3.1, the vulnerability has been carried over into almost every version of Windows that has appeared since.


 Windows bug security Microsoft
Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.
 Tor security privacy Internet software free proxy anonymity
US troops are to be allowed to use social networking websites such as Twitter and Facebook following a review of internet use and security.
 military USA Facebook Twitter social network security toread