Google just escaped being prosecuted by the US government in 2012, reports BBC. The US government almost sued Google in 2012 over its anti-competitive policy, including assignment it boosted the search rankings of its own sites over that of competitors. In the end, the FTC (Federal Trade Commission) decided
The big question is could the internet ever be switched off? We think the internet is unbreakable. At least, until now it is not proved. Perhaps a more accurate term would be “hijacking the Internet”. London’s Docklands district is a big building in which is a substantial node in
I was telling some time ago about a type of virus, ransomware which basically encrypts your data and you can not regain access unless you pay an amount of money as a reward. CryptoLocker has a new variant which targets gamers and stop them playing their favourite games unless they pay a
The BBC plans to give a million 11-year-olds a tiny computer this September. The Micro Bit was unveiled at this morning’s launch of Make It Digital, which is an determined project focused at getting us all to be creative with digital technology. Why BBC spends licence fee money on this instead of giving
Driverless cars could be vulnerable to hackers who could bring cities to a chaos, steal cars remotely or even commit deadly terror attacks, and many other problems, is a known fact. The report from the Institution of Engineering and Technology (IET) suggests that autonomous vehicles could be on the roads in
The UK’s National Crime Agency has arrested this week 56 suspected hackers as part of a “strike week” against cybercrime. In total, 25 separate operations were carried out across The United Kingdom. Those arrested are suspected of being involved in a wide variety of cybercrimes including data theft,
Called Freak, Factoring attack on RSA-EXPORT Keys, the security breach exists on high-profile websites. It is supossed that seven hours is all it takes to crack the encryption that is in place on some supposedly secure websites. Browsers can be hijacked and tricked into accessing websites using legacy encryption. There was
Security experts from G Data SecurityLabs analyzed Superfish adware. In this process, analysts have encountered in program, a technology component, called SSL digestion. It uses a root certificate which is poorly secured and has extensive rights on the computer. SSL Digestor intercept safe HTTPS connections which can be decrypted.
Samsung has presented this Sunday the Galaxy S6, and a sister smartphone, the Galaxy S6 edge, at Mobile World Congress in Barcelona. Samsung will sell this two versions, one of which has a screen that curves round its sides. Both devices feature a 64-bit processor which is designed to be
The SPDY protocol was announced by Google in November 2009 and implemented for the first time a year later. SPDY protocol aimed to optimize the old HTTP by implementing compression technologies, multiplexing and encryption. Although it is currently implemented in most browsers, the protocol has not received wide