10 Results for



Court: 15-year-old molester has a right to Facebook, Twitter

San Diego appeals court says the First Amendment means a teen convicted of molesting a toddler can't be kept off social media. But he will lose access to encryption, hacking and... steganography.

By November 8, 2012


Researchers warn of malware hidden in .zip files

Researchers find a way that attackers could get malware past antivirus software by hiding it inside documents via .zip and other file formats.

By April 14, 2010


Alleged Russian agents used high-tech tricks

Ten men and women arrested on charges of being secret Russian agents used high-tech spycraft, including steganography, private Wi-Fi networks, and flash memory sticks, prosecutors claim.

By June 28, 2010


Updated rogue AV installs on Macs without password

Mac malware gets a new name, new Mac interface, and installs without requiring a user admin password.

By May 25, 2011


Old-time hacktivists: Anonymous, you've crossed the line

Despite shared concerns, pioneers in the movement say the methods of a newer generation abridge free speech and hurt the cause.

By March 30, 2012


Meet Project Vigilant--the Wikileaks leak

Project Vigilant is the mysterious group whose members outed Wikileaks' alleged source and want to monitor Internet attacks to find out who's behind them.

By August 10, 2010


Google's Niels Provos battles malware on the Web

Leader of Safe Browsing at Google is digital age craftsman and protector of Internet users.

By January 19, 2011


Utilities Updates: Sleep Monitor 2.1; FinderCleaner 1.6; RBrowser 4.2.1; Cryptix 0.61; more

Utilities Updates: Sleep Monitor 2.1; FinderCleaner 1.6; RBrowser 4.2.1; Cryptix 0.61; more

By October 24, 2005


Security guide to customs-proofing your laptop

News.com offers a handy color-coded threat level system for protecting your data at international border crossings from snoopy customs agents.

By March 13, 2008


Steganos Security Suite 5.0

Steganos Security Suite's excellent collection of heavy-duty encryption and Internet cleanup tools is best suited to small business and corporations.

April 4, 2003

4.5 stars Editors' rating April 4, 2003

Pricing not available