Archive for the ‘Security’ category

Do you still reuse passwords? The recent study from University of California shows again that such a bad habit continues to exist. The worst thing about reusing passwords is that it doesn’t require being a technically skilled hacker to guess your password for this or that document.  

Note to PGP legal dept: I’m not going to put the ® sign every time when I mention PGP. I’m just tired; we already did that in our press release and on our web site, and I think it’s enough. No, really? Well, I’ll repeat one more time: all names like PGP are trademarks or registered trademarks of their respective owners in the UK, USA, Russia and probably somewhere else  e.g. in Albania. There are too many countries to mention, sorry :). Why should I care about (R)? Keep reading, and you’ll see the reason.

We never thought that our participation would bring such kind of trouble (or at least a disappointment).

Last week a colleague of mine, Andrey Belenko, gave a speech at the Troopers conference in Munich. Olga wrote about it in this blog. All the talks at Troopers were awesome. Soon the videos and slide shows will be available for downloading on Troopers website.

17" screen, Intel Core 2 Extreme processor (four cores) plus NVIDIA GeForce GTX 260M — an excellent device not only for gaming, but also for wardriving. Get it from Sager, and just add Wireless Security Auditor.

 

If you added this blog to your news feeder, then you prefer getting skilled rather than getting owned – as in Troopers’ motto.

From F-Secure advises against using Adobe Reader article:

The key findings of the survey of the 35860 wireless networks (in 12 Indian cities) are:

As posted by Rosalie Marshall in her today’s article, secret F-35 military plane design materials have been stolen presumably by Chinese hackers (?):