22 Is mobile advertising working for Google?
18 Printing handcuff keys
13 Extensions coming to Chrome browser
12 Dutch Ministry accidentally publishes credit card info
23 Tele2 Netherlands giving the same password to all users
16 Palm defends tracking Pre user locations
15 How not to respond to security issues
4 Squirrelmail plugins altered by hackers
30 Dutch court rules that The Pirate Bay should be blocked
27 iPhone 3GS encryption “useless”?
26 92% of Flash users affected by 0-day hole?
15 IPv6: downsides of a larger address space
19 Browser Security Lessons from the Chrome team
19 New guess about YouTube losses
18 Belgian government releases source code for election software
16 50 ways to inject your SQL
16 Should Twitter manage their own hosting?
13 Spammers are stupid
12 Apple admits Mac OS users can get viruses
10 What if every major browser had the same bug?
9 iPhone 3GS security improvements
9 Is a physical server more secure than a virtualized one?
7 Astalavista “hacker community” hacked.
5 Flaws in ATM machines – or in malware analysis?
29 Can you use photos posted on Flickr in a news article?
20 FBI exploring Second Life
14 Are adult sites safe? How misquoting can change a story
13 Some suggestions for newspapers
9 XSS against Google services: scary, but fixed fast
8 The downside of automatic updates
6 Silent updates: improving security?
3 Borders in Cyberspace
30 Another security breach offers a look at Twitter’s admin interface
28 Remote root exploit for Linux machines running SCTP applications
28 OAuth session fixation attack
24 Three signs Twitter has become mainstream
23 iPhone 3.0 finally adds iCalendar subscriptions
21 Was 4chan’s creation of Twitter accounts stopped, or did they lose interest?
17 Paid content coming to YouTube?
16 Black Hat Europe update: Trust issues?
15 “Kaminsky 2.0″ at Black Hat Europe tomorrow?
15 Amazon: technical glitch, censorship gone wrong, or was it a hacker?
11 Fiber cuts: does physical security matter?
11 Passwords and the iPhone
6 Can Twitter provide added value for Google?
1 Dutch Electronic Patient Records delayed over privacy, hacking fears
21 Chrome the only browser to survive Pwn2Own
20 Adobe finally patches flaw in Reader, needs to update blog platform
20 Microsoft’s Silverlight used on YouTube
19 Internet Explorer 8 released; is it really safer than other browsers?
16 MS09-08: When is a patch not a patch?
10 DSBL blacklist gone
5 Security issue in djbdns confirmed
27 Google adds Apps Status Dashboard
27 Did the EU just admit Skype calls can be intercepted?
23 Simple Wikipedia
22 First conference in SHA-3 competition starts next week
22 Wikileaks leaks identities of 58 donors
20 Zero-day exploit for Adobe Reader
19 Attacks against SSL show interesting possibilities
17 Twitter gets ready for OAuth authentication
13 Followup on Patch Tuesday post
11 Updates about Kaspersky SQL injection
9 What’s up with FeedBurner?
8 Kaspersky database exposed
8 Is this a new virus, or are virus scanners just slow to catch it?
7 Patch Tuesday: does Microsoft need a new severity rating?
5 Microsoft will fix Windows 7 UAC loophole after all
2 Gmail also hit by incorrect malware list
1 About IE8′s clickjacking protection
31 Google admits the internet is a dangerous place
28 Enhancing Blackberry security
27 Planning for failure
25 Mac malware getting serious
12 Cisco “improves” website security
5 33 high-profile Twitter accounts hacked
5 Law enforcement versus antivirus vendors
4 FUD about “unsafe” SSL certificates
2 Zune: small programming errors that have big consequences
31 SSL: A chain of trust is only as strong as the weakest link
29 Prediction for 2009: more phishing and spam via online services
23 Finding a “hidden” IP address just got easier
17 It’s official: MS08-78 fixing critical IE bug
17 All major browsers fixing bugs this week
16 Fix for IE7 zero-day to be available tomorrow
16 Twitter already generating revenue… For Dell!
16 Who’s to blame when hackers empty your bank account?
11 More details about IE7 zero-day exploit
9 Why did Google enter the mobile phone business again?
9 Internet Censorship: What do Amazon and Wikipedia have in common?
9 Zero-day exploit for IE7
6 Last security update for Firefox 2.0 to remove security feature
6 Details about Europeana’s problems: some interesting numbers
5 YouTube now officially offering HD option on some videos
4 Creating compressed .dmg files
3 Viruses? On a Mac? Did Apple really write about that?
1 Apple encouraging users to use anti-virus software
30 Keeping offline machines updated?
26 Chrome market share
25 New tool to easily scan your PC for necessary updates
24 European digital library overwhelmed by traffic
22 Microsoft gets 5th place in Spamhaus worst networks list
21 Youtube adds full HD resolution videos
20 Why post this comment?
19 McColo briefly returned, botnet still offline
18 HavenCo “data center” offline?
16 Firefox 2 end of life: what about Windows 9x users?
15 Another example of why you shouldn’t use the same password for every website
15 AVG offers free license and another false positive
13 Nuclear-powered datacenters: coming soon?
12 Major spam source shut down
12 New Chrome Mac build
11 Patch Tuesday: MS08-68 and MS08-69
10 AVG virus scanner removes critical Windows file
9 White House hacked on a regular basis?
8 Patch Tuesday november 2008
6 WordPress 2.6.4 is a fake!
5 Chrome TestShell build for MacOS X
4 Comparing the costs of cloud computing to traditional servers
3 Sprint and Cogent reconnect, but for how long?
2 Which internet are you on?
30 Is the government monitoring your car?
29 ORSN Alternative DNS root servers shutting down
26 MS08-67 updates: NT4 support, FAQ, reverse engineering
26 Google Navy training fighter pilots?
25 Belgian ISP scores first victory in P2P case
24 Gimmiv.A worm first to exploit MS08-67 vulnerability
23 Google notifying webmasters of security vulnerabilities
23 About Microsoft’s MS08-67 security bulletin
22 Updates about Sockstress TCP/IP attack
22 Wireless wiretapping for wired keyboards
20 Bypassing HTTPS-warnings in Firefox
19 Silverlight on the iPhone: not as unlikely as you might think
18 Up to 30 million PC’s using fake antivirus software
16 Flash 10 fixes clipboard hijacking, other security issues
16 Helping Twitter make money
15 Shocking news: not all IP addresses are actually used
14 In the UK, forgetting your encryption key might lead to jailtime
14 Opera users highly encouraged to upgrade
14 Joost video service now useable with just a browser
13 It’s official: patching bugs is bad for your company
13 Firefox Mobile getting closer to release
12 Clicky webstats finally gets campaign and goal tracking
12 Is Twitter losing its edge?
12 Russian researchers achieve 100-fold increase in WPA2 cracking speed
11 MessageLabs: taking spammers offline helps. For a day.
10 Belgian ISP: Filtering P2P traffic impossible
7 The latest headlines: now brought to you by hackers
6 US elections: democrats have the technological edge
5 T-mobile leaks personal data for 17 million subscribers
4 Using social media for advertising: Cisco leads the way, but don’t follow blindly
4 Iron Man release brings down BD-Live service
2 More details about TCP/IP attack surface
1 Flash finally coming to the iPhone
1 Mysterious TCP/IP flaw could bring down any machine in seconds
27 Webkit engine the first to pass all ACID3 tests
26 Google desperately defending the Yahoo deal
24 January 2, 2011: the day the internet is full
23 Blackberry encryption cracked?
22 Updates about data center value
21 Intercage taken offline
19 Adobe details planned changes to prevent clipboard hijacking
19 Amazon gets (a little bit) into the CDN business
19 Firefox Mobile getting serious
18 Intel sees the future of datacenters, and it does not include airconditioning
18 New Chrome builds available now
17 How much is a data center worth?
16 Gears available for Safari (on MacOS)
16 Chrome for Mac update: Crossover provides easy-to-install Mac port
15 Looking for a faster browser on your Mac? Try Webkit!
14 Google Chrome on MacOS X? Not so fast…
13 Windows Mobile to get IE6-based browser
12 More CERN images
12 Firefox to get private mode sooner?
11 Tracking down rogue devices on your network
10 Beautiful datacenter pictures by Cory Doctorow
9 Exploit for SCADA-systems in Metasploit
9 Apple non-event
8 Getting rich from sucking companies
7 Google Navy?
7 Sophos DNS mystery
4 New identity theft detection module for ClamAV
3 Google Chrome, the first bugs (and impressions)
2 Browser wars 2.0: does the world need Chrome?
2 Large Dutch bank leaks “secure” transaction codes
1 America becoming irrelevant to the internet?
1 Shutting of “bad” parts of the internet: good or bad idea?
29 What happens after your DNS cache is poisoned?
28 Viruses in outer space
28 Command line tools for Ahsay Online Backup Manager
27 Is SCO no longer accepting e-mail?
26 “Google hacker” exposes Chines athlete
26 Manual for handling leaks of personal information
23 A different way of backing up your image library
22 Rumor confirmed: both Fedora and Redhat servers hacked
21 Nokia series 40 exploit confirmed, 100 million handsets vulnerable?
20 Adobe working on malicious flash banners
19 Flash ads responsible for overwriting clipboard
19 Core Fedora servers hacked?
18 Newest malware truly cross-platform
18 New ActiveX controls to block
17 Free Nessus alternative
15 No security bugs in WordPress 2.6.0
15 Malware taking over your mac’s clipboard
14 Hackers capturing all your internet traffic. Unnoticed.
14 Kaminsky DNS vulnerability: attack probability and other updates
14 MacOS tip: using tab key in dialogs
7 Apple facing infrastructure problems?
7 Exploiting Debian SSL-bug
7 Firefox giving more insight into threats, security
6 Pulled Apple talk never submitted, or was it?
4 Apple building too many iPhones?
4 BitDefender: advertisers are major source of malware
4 Even more GIFAR details
3 Must-have iPhone app: NetShare
3 Tool for finding poisoned DNS caches
3 Apple absent at Blackhat
3 GIFAR updates
2 Google stops 419′ers
2 Snapshot Viewer ActiveX exploit in the wild
1 Dutch hacker arrested, botnet prices plummetting
1 New browser attack: GIFAR files
1 Real-life security: don’t talk to the cops. Ever.
1 IOC statement about censoring
1 DNS update from Apple finally available
1 Battle with network security
31 About this DNS bug thing
31 Update about “NASA hacker” Gary McKinnon
31 Twitter hacked, secured in under 4 hours
31 New DNS exploit in active use
31 UFO enthousiast or dangerous terrorist?
30 Slowing economy bad for spammers
30 Chinese internet censorship
30 Gmail security: good and bad stuff from Google
30 Oracle 0-day and how not to deal with security issues
29 Hello world!