Blog Posts Tagged with "file sharing"
April 04, 2012 Added by:Robert Siciliano
In my own P2P security research, I have uncovered tax returns, student loan applications, credit reports and Social Security numbers. I’ve found family rosters which include usernames, passwords and Social Security numbers for entire family...
December 21, 2011 Added by:Headlines
“The federal prison sentence handed down in this case sends a strong message of deterrence to would-be Internet pirates. The Justice Department will pursue and prosecute persons who seek to steal the intellectual property of this nation..."
August 13, 2011 Added by:Kelly Colgan
Parents can’t supervise their teens around the clock. So how can you protect your fiercely independent, world-weary, tech-savvy teen—the one with the bad case of selective hearing—from trouble online? Let us do the talking with these tips...
July 22, 2011 Added by:Headlines
''Stealing is stealing whether you use a computer command or a crowbar, and whether you take documents, data or dollars. It is equally harmful to the victim whether you sell what you have stolen or give it away," said U.S. Attorney Carmen Ortiz...
May 22, 2011 Added by:Ron Lepofsky
Researchers investigated the privacy of 100 file hosting services and discovered that a large percentage of them generate download uniform resource identifier (URI) in an insecure manner, which jeopardizes the confidential and privacy of user data...
April 19, 2011 Added by:Headlines
Dead Drops is an anonymous, offline, peer to peer file-sharing network in a public space. USB flash drives are embedded into walls, buildings and curbs. Everyone is invited to drop or find files on a dead drop. Plug your laptop to a wall, house or pole to share your favorite files and data...
February 09, 2011 Added by:Headlines
The MPAA has apparently issued more than 100 warnings to Google regarding copyright infringement over the last few months. The MPAA warnings are usually directed at P2P file sharing users who trade movies online, but sending them to Google is enforcement on a whole new level...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013