| 1. | | Revealed: how the FBI coordinated the crackdown on Occupy (guardian.co.uk) |
| 10 points by buffer on Dec 29, 2012 | past |
|
| 2. | | Swedish Gov. officials thought they were working under direct orders of the CIA (professorsblogg.com) |
| 7 points by buffer on Dec 29, 2012 | past |
|
| 3. | | Google Web Cache and MITM attacks (k3170makan.blogspot.com) |
| 2 points by buffer on Dec 29, 2012 | past |
|
| 4. | | Password Disclosure in D-Link Surveillance Cameras (CVE-2012-4046) (fishnetsecurity.com) |
| 2 points by buffer on Dec 29, 2012 | past |
|
| 5. | | Security in 2013: The rise of mobile malware and fall of hacktivism (pcworld.com) |
| 2 points by buffer on Dec 29, 2012 | past |
|
| 6. | | The 5 Coolest Hacks Of 2012 (darkreading.com) |
| 1 point by buffer on Dec 29, 2012 | past |
|
| 7. | | Breaking Hard-Disk Encryption (schneier.com) |
| 5 points by buffer on Dec 27, 2012 | past | 1 comment |
|
| 8. | | WordPress Security - An Infographic on common Malware and Attacks (page.ly) |
| 1 point by buffer on Dec 27, 2012 | past |
|
| 9. | | Computers: It's time to start over. (ieee.org) |
| 62 points by buffer on Dec 27, 2012 | past | 44 comments |
|
| 10. | | VPN Man-in-the-Middle Attacks: Fact or Fiction? (rsa.com) |
| 2 points by buffer on Dec 26, 2012 | past |
|