-
Recent Posts
Recent Comments
- Roman on We have been shortchanged on privacy by Google
- Chris Low on We have been shortchanged on privacy by Google
- BluRey BluRey on So G+ died, but the resident zombies say they ain't dead? What happened?
- Vishwanatha R on Benchmarketing: Intel responds to the Apple 5s reviews
- Celestra Erit Ultima (Der Imperator) on See what happens when kids grow up in a world of racial stereotypes
Categories
- EveryDayScience (12)
- Politics (55)
- Social Media (23)
- Tech Journalism (32)
- Tech Posts (103)
Archives
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
Monthly Archives: June 2012
Years Of Secret Cryptographic Research Uncovered In 0.02 Seconds
The Flame virus contains some highly advanced code to fake a Microsoft certificate. In the first part of this mini series we explained the discovery of a completely unknown cryptographic attack. Now we want to focus on the mysteries surrounding … Continue reading
Posted in Tech Journalism
Leave a comment
Apple found guilty of violating Samsung 3G patents!
An almost forgotten court case in the Netherlands finally got a verdict after Apple appealed against a fast procedure last October. What was at stake was SamsungĀ“s counterclaim that Apple violated the 3G/UMTS patents. In October the judge tried to … Continue reading
Ever wondered how malicious viruses can enter your fully patched PC?
Microsoft just published a new security bulletin which reveals there is a bug in Windows which needs fixing immediately. Is this the key to understanding all these stories about dangerous viruses? f you have followed the tech press these last … Continue reading
Posted in Tech Posts
Leave a comment
Flame Virus Uses Cryptographic Approach Unknown to Academic World
EuroTech spoke with leading experts who claim this specific method has never been published and must have been developed independently and in total secrecy. by Max Huijgen, EuroTech By using a newly developed tool which analyzes rogue certificates (which allows … Continue reading
Posted in Tech Journalism
Leave a comment