You are the content you publish.
Sign up with Facebook
Sign up with Twitter
I don't have a Facebook or a Twitter account
Start a free trial of Scoop.it Business
Lookout Security discovers flaw in early software on Google head-mounted system which lets it take control of data coming from wearable system. By Charles Arthur
Are you sure you want to delete this scoop?
By T.C. Sottek and Josh Kopstein Since September 11th, 2001, the United States government has dramatically increased the ability of its intelligence agencies to collect and investigate information...
Microsoft Security Research & Defense: Microsoft information on security mitigations, workarounds, and other technical leadership for better actionable guidance.
25% of DDoS attacks in 2013 will be app-based
Pass Zero Privacy Security
armoredcode.com is an application security blog designed for developers to help them in create secure code
A resource for developers looking to put HTML5 to use today, including information on specific features and when to use them in your apps.
Feross Aboukhadijeh is a computer security researcher, teacher, web developer, designer, long distance runner, gamer, music lover, and builder of websites that (sometimes) go viral.
The attacks, by a group claiming Middle Eastern ties, caused Internet blackouts and delays in online banking, and the banks did not explain clearly what was going on.
Alienvault R&D Labs Portal. Get the latest news from our research.
Our Anonymous 'friends' at LulzSec have reappeared, this time alleging that the FBI is tracking iOS device users.
On my (shell) command, unleash hell!
Those who use online anonymizing technologies to obscure their location are assumed to be non-US persons and should thus continue to be targeted by surveillance. That's one of many revelations comi...
RubySource | Fresh thinking for Ruby on Rails Development. Learn - Ruby Tutorials, Rails Migration, Ruby Gems, Test Driven Development - TDD and much more
Twitter users with SMS enabled are vulnerable to an attack that allows anyone to post to their account
After a mathematician received a cold-call recruiting email from Google about a job, he thought it was a spoofed message or a possible test.
Data breach at IEEE.org. IEEE members plaintext passwords leaked. Using the log data to gain insights into the engineering and scientific community.
Remember that Java 0 day vulnerability that was discovered a few weeks ago and took a while to get patched by Oracle?
Malware authors are fond of using social networking sites to spread their well crafted malwares.