Top Story

Hacker Group Anonymous Aims to Destroy Facebook on Nov. 5
Hackivist group Anonymous vows to "kill Facebook" on November 5, citing users' lack of choice in privacy as its reason for attack. The group of hackers has claimed participation in just about every recent notable hacking attack

Hackers take aim at prison locks and other real-world targets
If you've seen the 1983 movie "WarGames," in which a young Matthew Broderick accidentally uses computers to bring the world to the edge of "global thermonuclear war," then you have a pretty good idea what hackers and security researcher

Invasion of the Body Hackers? Wireless Medical Devices Susceptible to Attacks
Concerned about the security guarding certain wireless-enabled medical devices, researcher Jerome Radcliffe attempted to hack into the insulin pump he wears on his body to keep his Type 1 diabetes in check



Microsoft Touch Mouse Feels Just Right

Technology, Hardware
Wednesday, 17 August 2011

Microsoft Touch Mouse Feels Just Right Let's imagine Microsoft two years ago, gazing longingly at Apple's just-released Magic Mouse and wondering how Microsoft might jump into the buttonless mouse game. Cut to the present day, and the Redmond giant has released Touch Mouse

Anonymous Hackers Attack BART Website

Security, Enterprise Security
Tuesday, 16 August 2011

Anonymous Hackers Attack BART Website Hackivist group Anonymous attacked San Francisco's Bay Area Rapid Transit (BART) website, myBART.org, on Sunday. As of Monday, the site is still down, with a message that reads, "This site is currently under renovation."

Starbucks Card Social Experiment Hacked by Entrepreneur

Security, Identification (ID)
Saturday, 13 August 2011

Starbucks Card Social Experiment Hacked by Entrepreneur Sam Odio, a serial entrepreneur who previously sold his photo startup Divvyshot to Facebook, has manipulated Jonathan Stark’s now-famous communal Starbucks Card to transfer $625 of the balance to his own Starbucks Card

Kabam! Facebook gamers fume after script deletes fake stuff

Security, Malware
Friday, 12 August 2011

Kabam! Facebook gamers fume after script deletes fake stuff On August 4, Kabam turned up in The Los Angeles Times, lauded as a small social gaming company "quietly gaining momentum" in an arena dominated by giants like Zynga, Electronic Arts, and Disney. But that same day, engineers pushed out

China Cracks Down on Fake Apple Stores

Security, Identification (ID)
Friday, 12 August 2011

China Cracks Down on Fake Apple Stores The Chinese city of Kunming has stopped 22 fake Apple stores from using Apple's trademarks -- including its iconic logo -- after the company submitted a complaint to the local government

Google and Facebook face-off in social games

Technology, Web
Friday, 12 August 2011

Google and Facebook face-off in social games Facebook is not the only game in town anymore. The world's largest Internet social network moved on Thursday to shore up support with game developers such as Zynga, who provide one of Facebook's biggest draws, on the same day that Google

Charges filed over leaked iPhone 4 prototype

Security, Privacy
Thursday, 11 August 2011

Charges filed over leaked iPhone 4 prototype Misdemeanor charges have been filed against the two men responsible for shopping around a lost iPhone 4 prototype to various websites before the iPhone 4 was officially unveiled, though no one from Gizmodo

World's First Glasses-Free 3D Laptop Comes With Health Risks

Technology, Mobile
Wednesday, 10 August 2011

World's First Glasses-Free 3D Laptop Comes With Health Risks Toshiba announced the Qosmio F755 3D laptop on Tuesday, describing it as "the world's first laptop capable of displaying glasses-free 3D and 2D content at the same time on one screen"

Apple Releases OS X Lion 10.7.1

Technology, Software
Wednesday, 17 August 2011

Apple Releases OS X Lion 10.7.1 Lion users, get ready for a software update. Apple has just released out its first update for OS X Lion. The latest Mac OS, 10.7.1, is available as of Tuesday. The update weighs in at a mere 17.4 MB, a nice departure from the hefty update

Hackers hit newspaper site, claim Quebec PM dead

Security, Enterprise Security
Tuesday, 16 August 2011

Hackers hit newspaper site, claim Quebec PM dead Hackers attacked the website of a prominent Canadian newspaper early on Tuesday and posted a false news item alleging Quebec Premier Jean Charest had died of a heart attack, the paper said

Sprint ditches 4G model of RIM PlayBook

Technology, Mobile
Saturday, 13 August 2011

Sprint ditches 4G model of RIM PlayBook Sprint Nextel Corp has scrapped plans to sell a high-speed version of Research In Motion Ltd's PlayBook tablet because of slack demand, delivering another blow to BlackBerry phone maker

Carriers crack down on unauthorized cell phone tethering

Security, Exploits & Vulnerabilities
Friday, 12 August 2011

Carriers crack down on unauthorized cell phone tethering Recently AT&T and Verizon both announced that they're cracking down on users who skirt their monthly add-on fees to "tether" -- which means they use their phones' connection to link laptops and other gadgets to the Internet

iPhone 5 Could Be Revealed September 8

Technology, Mobile
Friday, 12 August 2011

iPhone 5 Could Be Revealed September 8 A report from one Japanese website marks September 8 as the date of Apple’s next media event, at which some expect the company to launch the iPhone 5

Chinese government under cyber siege

Security, Enterprise Security, Network Intrusion
Thursday, 11 August 2011

Chinese government under cyber siege The Chinese government claims it came under almost 500,000 cyberattacks last year, most of which it said originated outside the country. Most of the attacks involved Trojan horse malware, according to a report by the National Computer

German hackers crack mobile phone GPRS code

Security, Enterprise Security, Encryption
Thursday, 11 August 2011

German hackers crack mobile phone GPRS code The discovery of a way to eavesdrop so-called General Packet Radio Service (GPRS) technology allows a user to read emails and observe the Internet use of a person whose phone is hacked, said Karsten Nohl, head of Security Research Labs

Hong Kong exchange trading disrupted as hackers target website

Security, Enterprise Security, Network Intrusion
Wednesday, 10 August 2011

Hong Kong exchange trading disrupted as hackers target website The Hong Kong stock exchange was forced to suspend trading in stocks including HSBC Holdings after hackers broke into the exchange's website on Wednesday, preventing investors from accessing company announcements made during the midday

Firefox 6 Released Early

Technology, Software, Web
Tuesday, 16 August 2011

Firefox 6 Released Early Firefox 6 isn't scheduled to be released until Tuesday, but Mozilla has uploaded installation files to a FTP server for those who want to get their hands on the upgraded browser early

Da Vinci's Codex launched on iPad

Technology, Mobile
Tuesday, 16 August 2011

Da Vinci's Codex launched on iPad "The Da Vinci Code" may have been a popular e-book for years, but now readers around the world can view the manuscripts of Leonardo da Vinci's Codex Arundel in high definition on iPad as the British Library launches its "e-book treasures"

Security expert warns hackers can attack Android

Security, Exploits & Vulnerabilities
Saturday, 13 August 2011

Security expert warns hackers can attack Android A mobile security expert says he has found new ways for hackers to attack phones running Google Inc's Android operating system. Riley Hassell, who caused a stir when he called off an appearance at a hacker's conference last week

Angry Birds, other games come to Google

Technology, Gaming
Friday, 12 August 2011

Angry Birds, other games come to Google Google upped the ante in its challenge to Facebook Thursday by introducing games into its nascent social network Google+. Just as in Facebook, Google+ users will now be able to play games such as Angry Birds, Zynga Poker, and Crime City

Near Field Communication: A Quick Guide to the Future of Mobile

Technology, Mobile
Friday, 12 August 2011

Near Field Communication: A Quick Guide to the Future of Mobile Before it became a hot topic sometime early last year, few civilians had come across the term "near field communication" (NFC). Corporations, however, had been excited about the technology's potential since at least 2004 -- when Nokia

Twitter launches own photo-sharing tool

Technology, Web
Thursday, 11 August 2011

Twitter launches own photo-sharing tool Twitter has launched its own photo-sharing tool, offering a native version of a feature that until now was mostly the domain of third-party apps like Twitpic and yfrog. The feature first began trickling out to users after it was introduce

Congresswoman eyes McAfee briefing on cyber attacks

Security, Enterprise Security
Thursday, 11 August 2011

Congresswoman eyes McAfee briefing on cyber attacks A congresswoman on Wednesday requested more information on security company McAfee's report detailing a five-year hacking campaign that breached 72 organizations globally

Hacker group vows to 'kill Facebook'

Security, Enterprise Security
Wednesday, 10 August 2011

Hacker group vows to 'kill Facebook' Apparently, "Anonymous" won't be accepting your friend request. Members of the shadowy collective known for its politically motivated Web hacks and attacks are targeting Facebook for what they claim to be the social-networking giant

Explore What's Inside Security Science

Global Internet Security News Global Internet Security News
Elevates people's awareness level by providing the most informative security related news and events, which includes, but is not limited to, financial and business security, information and technology security, as well as corporate and individual security worldwide.
Information Security Information Security
Security Policy Resource page, a compiled research project of the SECURITY-SCIENCE team. The ultimate goal of this project is to offer everything you need for swift development and implementation of information security policies. You'll find a great set of policies posted here, including, but is not limited to, procedures and guidelines, that you can easily align to your company’s security requirements.
Internet Security Tools Internet Security Tools
State of the art security technology solutions (software, hardware, appliances and gadgets--including HOWTOs and guidelines) for computer and network defense, perimeter protection and environment security and safety.
Learn Internet Security Science Learn Internet Security Science
Provides superior security education on how to counter attack security risks, threats and vulnerabilities by using the most advanced techniques practiced and put into application by professional hackers, forensics, investigators and penetration testers.
Grokker - Technology Encyclopedia Hackopedia
A free security encyclopedia for computer, Internet and security terms and definitions created, researched, reviewed and maintained by Security-Science.
Internet Security Experts - Knowledge Exchange Internet Security Experts
An avenue for exchanging knowledge and KNOW-HOWs which allows users to interact with each other for mutual assistance and support by collaborating, asking, answering and sharing information about security related issues and concerns that benefit everyone.