You love Google? Hate it? In any case – cool video playlist on how Google deals with hacking. Want it or not – your information is in Google servers and somebody has to protect it. https://www.youtube.com/playlist?list=PL590L5WQmH8dsxxz7ooJAgmijwOz0lh2H Five elite security teams. Six never-before-told stories. Go behind the scenes with the hacking teams at Google keeping more…
Attack on computer memory reveals vulnerability of widely used security systems
Attack on computer memory reveals vulnerability of widely used security systems . An interesting news about breaking into laptops, which are "secured" by encrypting disks. TrueCrypt is also vulnerable (due to generic design of the encryption suite). "Disk encryption technologies rely on the use of secret keys — essentially large random numbers — to…
Fighting cybercrimes in Saudi Arabia
Few bits of information about cybercrime laws in Saudi Arabia: Persons found guilty of running websites in support of terrorist organizations will be jailed for 10 years and fined SR5 million Persons who illegally take others’ money or obtain bank and credit data will be jailed for three years and fined SR2 million Persons who…