Who-needs-a-reason asks: I think your review of SparkyLinux was a bit harsh, especially the part about justification. Since when does a Linux distribution have to justify its existence? DistroWatch answers: Linux distributions do not need to justify their existence. I believe one of the benefits of working with free and open source software is that […]
Google’s latest Transparency Report reveals government requests for data jumped 15 percent from the end of 2013, and that nine countries requested data for the first time.
Apple finally has enabled two-factor authentication for its iCloud storage service, more than a year and a half after the company first turned the protective measure on for iTunes purchases and Apple ID.
GMX, the free email provider used by Bitcoin’s creator, says it can’t talk about the hack of Satoshi Nakamoto’s account for privacy reasons, but does confirm that inactive accounts are terminated after 6 months.
A relatively new exploit kit that exploits old versions of Adobe Flash, Reader and, Silverlight has begun to make the rounds.
Adobe released a new version of Reader and Acrobat, patching eight security vulnerabilities in the PDF reader. The patches were delayed a weeks because of issues during regression testing.
The researcher who originally discovered the same-origin policy bypass in the Android browser said he reported the vulnerability to Google some time ago, but that the company’s Android security team said it was unable to reproduce the issue.
NSA Director and Commander of U.S. Cyber Command, Admiral Mike Rogers, urged listeners at the Billington Cybersecurity Summit that cyber-resilience should be the focus of network defense.
IBM reports a variant of the Citadel banking Trojan was spotted in APT-style targeted attacks against petrochemical companies in the Middle East.