Security Article

The Onion explains how its Twitter account was hacked

IDG News Service – Hackers who commandeered The Onion’s Twitter account used simple but effective phishing attacks to obtain passwords, according to a writeup by the publisher’s technology team. The Syrian Electronic Army (SEA), a group supporting embattled Syrian President Bashar al-Assad, has also compromised prominent Twitter accounts, including those of the Associated Press, The Guardian,

Security Article

Windows Server 2012

Cloud computing in general, and private clouds in particular, have emerged as a response to the high cost and lack of agility of traditional approaches to IT. The  needs of IT users and the rate of technological change have increased signifi cantly. At the same time, the need to improve IT effi ciency and reduce

Security Article

Updating Hash Security: NIST and SHA-3

The NIST (National Institute of Standards and Technology) is holding a competition aimed at finding the best possible replacement for the cureent SHAs (Secure Hash Algorithms) — SHA-1 and SHA-2. Cryptographers are submitting new mathematical algorithms in order to develop a more secure and robust substitute that will strengthen the hash functions that are used

My Share Security Article

Anonymous claims to expose bank executive details

Hacktivist group Anonymous said it has posted the sensitive details of 4,000 bank executives on a government website. On Sunday night, an Anonymous Twitter account called “OpLastResort”tweeted about the leaked information, which was posted on the website of the Alabama Criminal Justice Information Center (ACJIC), a clearinghouse of criminal records and statistics for the state. The ACJIC page