Digital security


764 articles

Google your own health record?

Google your own health record?

Google your own health record?

Cameron Camp22 Aug 2011


Proudhon and the Social Media

Proudhon and the Social Media

Proudhon and the Social Media

...both articles are concerned with breaches of copyright and IP abuse...

David Harley16 Aug 2011


Hack wireless industrial sensors in a few easy steps

Hack wireless industrial sensors in a few easy steps

Hack wireless industrial sensors in a few easy steps

Cameron Camp09 Aug 2011


Hacktivism: not a get-out-of-jail card?

Hacktivism: not a get-out-of-jail card?

Hacktivism: not a get-out-of-jail card?

What we're lacking here is a clear differentiation between types of "hacktivist" or, indeed, "activist": much of the commentary that's around at the moment seems to assume that all hacktivists are the same.

David Harley03 Aug 2011


Data breach insurance: Is it worth it?

Data breach insurance: Is it worth it?

Data breach insurance: Is it worth it?

Cameron Camp27 Jul 2011


50 ways to hack a website

50 ways to hack a website

50 ways to hack a website

Cameron Camp26 Jul 2011


Stuxnet: Broke Iranian nuclear centrifuges?

Stuxnet: Broke Iranian nuclear centrifuges?

Stuxnet: Broke Iranian nuclear centrifuges?

Cameron Camp25 Jul 2011


‘Anonymous’ NATO data breach?

‘Anonymous’ NATO data breach?

‘Anonymous’ NATO data breach?

Cameron Camp21 Jul 2011


The Price of Fame

The Price of Fame

The Price of Fame

...there are (over) 2,095,006,005 Internet users nowadays (due credit to www.internetworldstats.com). Inevitably, some of them are going to have the same name as real celebrities and fictional characters...

David Harley18 Jul 2011