In a masterpiece of timing, the Japanese government is considering a new NSA-style agency to monitor internet communications in the country. Top government security advisory panel the National Information Security Centre (NISC), which is chaired by prime minister Shinzo Abe, is currently seeking public consultation on its Cyber Security 2013 draft report (Japanese), published on Monday. The report
Forget phones, PRISM plan shows internet firms give NSA everything It has been a rough 24 hours for the US National Security Agency. First a leaked court order (and the political reaction) showed that the agency routinely harvests US mobile-use data, and now a new document has been uncovered that claims to show the larger internet companies do the same thing. A 41-page presentation, given in April
[SE-2012-01] Yet another Reflection API flaw affecting Oracle's Java SE From: Security Explorations <contact () security-explorations com> Date: Mon, 22 Apr 2013 09:08:21 +0200 Hello All, Today, a vulnerability report with an accompanying Proof of Concept code was sent to Oracle notifying the company of a new security weakness affecting Java SE 7 software. The new flaw was verified to affect all v
The authorities in Japan are so worried about their inability to tackle cybercrime that they are asking ISPs there to block the use of Tor. According to The Mainichi, the National Police Agency (NPA, a bit like the Japanese FBI) is going to urge ISPs to block customers if they are found to have "abused" Tor online. Since Tor anonymises traffic, that can be read a presumption of guilt on anyone wh
Persona, Mozilla’s easy and safe way to log into your favorite websites, using any modern browser, is now in Beta 2. The goal of Persona is simple: we want to eliminate passwords on the Web. This release, packed with performance improvements and new features, brings us another big step closer to that goal. In particular, we’ve made it easy for users with existing Web accounts to log in without cre
This is a system for preventing password theft, by mixing several dummy cursors in with the real cursor. The software keyboards used in online banking are effective against key loggers, but by taking screen captures or looking over your shoulder, people would be able to work out your password. With this system, only the user knows which cursor is the real one, so there's no concern about people st
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く