Items waiting in the Pocket queue: 1501

Enter one or more words
Enter one or more words
Enter one or more words
Questions used as security checks on websites need to be replaced by more complex tests to establish a person's identity, say researchers. A study has shown how easy it is to guess the answer to common questions, such as someone's mother's maiden name. It found attackers will be able to break into 1 in 80 accounts if they get three chances to guess answers.


 hacking security password Internet toread
Legacy Locker is a safe, secure repository for your vital digital property that lets you grant access to online assets for friends and loved ones in the event of loss, death, or disability.
 death identity Internet security
A "complex cyber-espionage" network that penetrated various organisations including the Office of the Dalai Lama, has been uncovered by researchers.


 spying Internet security Dalai Lama United Nations
Scientists have found that by varying the voltage to key parts of a computer's processor, the ability to keep this data secret is compromised.


 security cryptography CPU encryption chip voltage hacking
The computer systems used to control modern cars are very vulnerable to attack, say experts. An investigation by security researchers found the systems to be "fragile" and easily subverted. The researchers showed how to kill a car engine remotely, turn off the brakes so the car would not stop and make instruments give false readings.


 hacking security car software
Its analysis of 240m web pages over 13 months showed that fake anti-virus programs accounted for 15% of all malicious software. Scammers trick people into downloading programs by convincing them that their PC is infected with a virus.


 Google anti-virus fake hacking security Internet virus
Adobe has acknowledged a "critical" security flaw in its Reader, Acrobat and Flash Player software. Adobe says the vulnerability potentially enables hackers to take control of affected computer systems.


 security Adobe software Internet
Investigators say the US military has been giving tens of millions of dollars to Afghan security firms who are channelling the money to warlords. Trucks carrying supplies to US troops allegedly pay the firms to ensure their safe passage in dangerous areas of Afghanistan. The convoys are attacked if payments are not made, according to allegations in a US military document.


 Afghanistan enemy racket security warlord military Taliban USA invasion politics war profiteering Catch 22
Security experts have found that many of the kits used by cyber criminals are riddled with bugs and vulnerabilities. Exploiting the bugs might mean that the attack tools can be turned against those using them. The bugs found by the researchers could be used to identify who is using the tools and even launch a counter-attack.


 revenge hacking security
Police handcuffs can't restrain them. High security locks can't keep them out. Very little can thwart the lock picking and safe cracking skills of an elite group of Dutch hackers known as Toool.


 lock picking hobby security lock
A British computer expert has been entrusted with part of a digital key, to help restart the internet in the event of a major catastrophe.


 Internet catastrophy emergency key DNS encryption switch security