Security News

http://cryptome.org/hack-power.htm http://groups.yahoo.com/group/coldwarcomms/message/12951 To: coldwarcomms () yahoogroups com From: Date: Sat, 1 Mar 2008 10:40:46 -0800 (PST) Subject:...

http://www.dailymail.co.uk/pages/live/articles/news/news.html?in_article_id=508543 The Daily Mail 16th January 2008 A computer nerd from Shepherd's Bush, West London, became al Qaeda's top...

http://www.taipeitimes.com/News/world/archives/2006/05/23/2003309631 KUALA LUMPUR AP May 23, 2006 Southeast Asia will inevitably face an Internet-based attack by terrorists against key...

Forwarded from: William Knowles http://www.washingtonpost.com/wp-dyn/content/article/2006/03/25/AR2006032500020.html By Rita Katz and Michael Kern March 26, 2006 For almost two years, intelligence...

Forwarded from: William Knowles http://www.washingtonpost.com/wp-dyn/content/article/2005/08/05/AR2005080501138.html By Steve Coll and Susan B. Glasser Washington Post Staff Writers August 7, 2005...

http://www.theage.com.au/news/breaking/cyberterrorists-copying-hackers-us/2005/08/03/1122748669953.html Kuala Lumpur August 3, 2005 Cyber-terrorists are attempting to penetrate government networks...

http://www.computerworld.com/securitytopics/security/story/0,10801,95108,00.html By Dan Verton and Lucas Mearian AUGUST 09, 2004 COMPUTERWORLD The widespread availability of sensitive information...

http://www.computerworld.com/securitytopics/security/story/0,10801,93741,00.html By Paul Roberts JUNE 09, 2004 IDG NEWS SERVICE A majority of security executives surveyed said their companies...

Forwarded from: Dan Verton Folks, Here's the story of how I got screwed. I was duped, I was had -- call it what you will. Despite calls to the FBI and security firms and other journalists around...

Islands in the Clickstream: Do Terrorists Really Have More Fun? Bruce Schneier, the author of Applied Cryptography and CTO of Counterpane Internet Security, told me that he can not walk through a...