• LOGIN
    • No products in the cart.

Login

Retrieve Password
Back to login/register

Security

14

Oct'11

Apple fix 96 vulnerabilities in iOS 5 release

Apple has this week (12th October) released it’s latest mobile operating system called iOS 5. The new iOS 5 patches …

Read More

14

Oct'11

Facebook and Twitter social media API security

Julian Evans wondered for some time whether it might be possible to develop a security app for Facebook, that provides …

Read More

14

Oct'11

How identity fraudsters steal your overdraft facility

Fraudsters are smart, so much so that they know how to outwit the banks security, clearing system and best of …

Read More

07

Oct'11

Facebook launches anti-malware URL scanning service

Facebook is introducing URL (link scanning) protection for its users as from today (Oct 3rd, 2011). When a user clicks …

Read More

07

Oct'11

nVidia GeForce GPU cracks six character password in four seconds

An nVidia GeForce GT220 graphics card, which costs about 30 GBP, is capable of cracking strong passwords in a matter …

Read More

06

Oct'11

Microsoft fix 23 vulnerabilities for "Patch Tuesday"

Microsoft have released their “Patch Tuesday” update for October 11th which includes a critical flaw that could give attackers the …

Read More

30

Sep'11

Amazon Kindle Fire Silk browser not so private

The Amazon Kindle Fire (launched 09/28/11) runs a browser called Silk but it also supports/runs software in Amazon’s cloud. The …

Read More

29

Sep'11

Google Chrome AutoFill privacy and security issues

Google Chrome users who read julianevansblog.com, have voiced concerns on a number of occasions recently about the AutoFill feature. Let’s …

Read More

29

Sep'11

Adobe release critical Flash security update

Adobe is released a security update on (Sept. 21) to fix critical flaws in its Flash Player program that are …

Read More

29

Sep'11

UKChatterbox IRC website personal data stolen

Popular UK IRC service UKChatterbox has commenced advising users to change their passwords following a databreach which culminated in compromised …

Read More