Oil, gas field sensors vulnerable to attack via radio waves

Sensors widely used in the energy industry to monitor industrial processes are vulnerable to attack from 40 miles away using radio transmitters, according to alarming new research.

read more

Five indicted in massive hacking scheme

Five men from Russia and Ukraine have been indicted in New Jersey for charges they conspired with each other in a worldwide hacking scheme targeting major corporate networks that compromised more than 160 credit card numbers, the U.S. Department of Jus…

read more

Snowden cleared to leave airport, enter Russia

Edward Snowden, who leaked documents revealing U.S. National Security Agency surveillance programs, has received a document that allows him to leave Moscow’s Sheremetyevo airport, according to news reports.

read more

Google Play Misses Dangerous Apps at Border Control

Despite yeoman efforts by Google to close a critical hole in its Android mobile operating system that allows any app to be turned into a malicious Trojan, programs are still appearing in the company’s Google Play store with the flaw. A number of apps containing the so-called MasterKey vulnerability were discovered by cybersecurity firm Bitdefender last week.

read more

Tired of spam? Hand out a disposable email address

A new privacy tool called MaskMe may help people evade data harvesting efforts by websites and marketers.

read more

Apache-Tomcat VHost redirection

OK this isn’t rocket science however I thought it worth documenting since I will probably forget in 6 months to a year when asked to do this again. The Situation: Tomcat running with an Apache front-end using AJP to pass all traffic through to Tomcat after authenticating against CAS. The Problem: The tomcat application did […]

read more

Edward Snowden seeks asylum in Russia

Edward Snowden, the leaker of documents that revealed National Security Agency surveillance programs, has submitted a request for temporary asylum in Russia and could be granted a decision within several weeks, according to news reports.

read more

Raspberry Pi: the Perfect Home Server

Raspberry Pi

Ever since the announcement of the Raspberry Pi, sites all across the
Internet have offered lots of interesting and challenging uses for this
exciting device. Although all of those ideas are great, the most obvious
and perhaps least glamorous use for the Raspberry Pi (RPi) is creating
your perfect home server.
more>>

read more

Tizen Rising: Can a $4M App Challenge Do the Trick?

It’s no secret that humans tend to be motivated by cash, and developers are no exception — heck, even Microsoft knows that! Little wonder, then, that Linux developers took in the latest from the Tizen project with such interest. “Tizen is a brand new ecosystem, with a brand new store,” the announcement read.

read more

Advanced Task Killer Pro Gets Hung Software Out of Your Way

Since time immemorial, the Windows computer has been subject to RAM issues — in particular, the issue that there’s generally never enough. RAM is the fast-accessible headspace, or breathing room, in a personal computer that’s used by programs to do their thing, as opposed to hard drive storage that’s usually used for slower, mechanical file storage.

read more