benrothke writes Technology is neutral and amoral. It’s the implementers and users who define its use. In Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, author Marc Goodman spends nearly 400 pages describing the dark side of technology, and those who use it for nefarious purposes. He provides […]
Month: March 2015
tsu doh nimh writes If you’re an American and haven’t yet created an account at irs.gov, you may want to take care of that before tax fraudsters create an account in your name and steal your personal and tax data in the process. Brian Krebs shows how easy it is for scammers to register an […]
Apple Extends Its Trade-In Program
Mark Wilson writes “Earlier in the month it was reveal that Apple was about to start offering gift cards as part of a trade-in program for people buying new a new iPhone. The updated program has now gone live so you can take your old Apple device, or non-Apple smartphone to an Apple store, or […]
msm1267 writes Dark corners of the Internet harbor trouble. They’re supposed to. But what about when Yahoo, CNN.com, TMZ and other busy destination sites heave disaster upon visitors? That’s the challenge posed by malvertising, the latest hacker Golden Goose used in cybercrime operations and even in some targeted attacks. Hackers are thriving in this arena […]
seven of five writes One man is dead and another severely injured after a shootout at one of the main gates of the National Security Agency located at Fort Meade, Maryland. Two men dressed as women attempted to ‘penetrate’ the entry point with their vehicle when a shootout occurred, officials said. The FBI said they […]
MTorrice writes: A foam composed of a polymer derived from crustacean shells may prevent more soldiers from falling victim to the most prolific killer on the battlefield: blood loss. Pressure is one of the best tools that medics have to fight bleeding, but they can’t use it on severe wounds near organs. Here, compression could […]
angry tapir writes: The Australian government has revealed its (previously mooted) proposed legislation that will allow copyright holders to apply for court orders that will force ISPs to block access to pirate websites. It forms part of a broader Australian crackdown on online copyright infringement, which also includes a warning notice scheme for alleged infringers. […]
itwbennett writes With AMD’s fade out from the server market and the rapid decline of RISC systems, Intel has stood atop the server market all by itself. But now IBM, through its OpenPOWER Foundation, could give Intel and its server OEMs a real fight in China, which is a massive server market. As the investor […]
Taxpayer Subsidies To ULA To End
schwit1 writes Because it has concluded that they make it impossible to have a fair competition for contracts, the Air Force has decided to phase out taxpayer subsidies to the United Launch Alliance (ULA). The specific amounts of these subsidies have been effectively buried by the Air Force in many different contracts, so we the […]
Anne Thwacks writes The British Government web site for applying for for a licence to be a security guard requires a plugin providing Internet Explorer emulation on Firefox to login and apply for a licence. It won’t work with Firefox without the add-on, but it also wont work with Internet Explorer! (I tried Win XP […]