Archive | February, 2012

Google offers $1 million in exploit rewards for Chrome hacks

Posted  February 28, 2012 Google is offering cash prizes totaling $1 million to hackers, plus a Chromebook, for those who successfully exploit its Chrome browser at the CanSecWest security conference next week. Read all about it on Naked Security. 

Leave a comment Continue Reading →

25 ‘VeriSign Trusted’ shops found to have XSS holes

Posted February 28, 2012 A grey hat hacker has discovered cross-site scripting (XSS) holes in 25 UK online stores that are certified as safe by the likes of VeriSign, Visa, and MasterCard. Read the full story on Naked Security.

1 Comment Continue Reading →

Activists creating decentralized mesh networks that can’t be blocked, filtered or silenced

Posted February 24, 2012 Imagine an Internet beyond the reach of censorship and surveillance. Imagine an Internet that couldn’t be shut down when a repressive government such as Egypt’s snaps its fingers at its ISP lackeys. Perhaps it’s beyond the reach of mass adoption, but the groundwork’s being laid. Read the full story in March’s […]

Leave a comment Continue Reading →

IRS releases its top ‘Dirty Dozen’ tax scams

Posted February 22, 2012 Ushering in tax season, the U.S. Internal Revenue Service (IRS) has released its annual “Dirty Dozen” tax scams for 2012. Read the story on Naked Security.

Leave a comment Continue Reading →

Bogus Twitter and Wikipedia sites fined and booted offline

Posted February 17, 2012 Two typosquatting sites, “” and “,” have been forced offline and fined £100,000 ($156,000) each by a UK telephone regulatory agency. In this post, I pass along tips on how you can avoid falling victim to typosquatters. Here’s the Naked Security article.

Leave a comment Continue Reading →

Over 90% of Facebook users hate having photos of them posted without approval

Posted February 16, 2012 Facebook users overwhelmingly agree that it’s unacceptable to post photos or videos of them without asking permission first. Some even think it should be illegal. Unfortunately, Facebook doesn’t provide a way to force your friends to request your approval before tagging you in a photo. Read the article on Naked Security.

Leave a comment Continue Reading →

What to Do When an Employee Cries (Legal) Wolf

There are nightmare employees who threaten legal action on flimsy grounds, including charges of racial, gender, or disability discrimination. How do you defend your company? Conversely, are you sure they’re not right? Read the feature story on HP Input/Output. 

Leave a comment Continue Reading →

Online dating and your privacy: Is it a doomed relationship?

Posted February 14, 2012 On this Valentine’s Day, we find that it is increasingly difficult to be both lovelorn and discreet. Read it. 

Leave a comment Continue Reading →

EPIC sues FTC over Google’s planned privacy changes

Posted February 13, 2012 The Electronic Privacy Information Center is suing the Federal Trade Commission in an attempt to compel the agency to stop Google’s planned privacy changes. Read it. 

Leave a comment Continue Reading →

Apple supplier Foxconn hacked not for bad factory conditions but for kicks

Posted on February 10, 2012 Foxconn, a Taiwanese manufacturer of Apple’s iPhone and iPad infamous for inhumane working conditions, has been hacked by a group calling itself Swagg Security. To read the full article, click here. 

Leave a comment Continue Reading →