sensitive documents

sensitive documents

Google buys malware-scanning website VirusTotal

Nortel Networks hackers had "access to everything" for years

arstechnica.com
Nortel Networks suffered a security breach that for almost a decade gave attackers with Chinese IP addresses access to executive network accounts, technical papers, employee emails and other sensitive documents at the once-thriving telecommunications firm, The Wall Street Journal reported (subscription required). The publication, citing a former 19-year Nortel...
Nortel Networks hackers had "access to everything" for years

AMD claims that ex-employees gave Nvidia stolen documents

venturebeat.com
When Nvidia hired Robert Feldstein, it got more than just one of AMDs’s top execs — it also got some of AMD’s most sensitive trade secrets. So says AMD, which alleges that the former vice-president and three other former employees passed sensitive documents to its rival after leaving AMD. Chief among these files are highly...
AMD claims that ex-employees gave Nvidia stolen documents
Unsecured passwords, photos, and other files found on Amazon's cloud

EMC's Syncplicity to gain hybrid-cloud storage capability

www.pcworld.com
Only a year after acquiring Syncplicity, EMC is getting ready to make the company's enterprise file management system work with hybrid clouds.Syncplicity began as software for enterprises and consumers to synchronize and share files in public clouds. EMC bought the company about a year ago and soon added features...
EMC's Syncplicity to gain hybrid-cloud storage capability

PC security: Your essential software toolbox

www.pcworld.com
Mobile malware is getting lots of attention these days, but you can't forget about your PC's security--after all, you probably still use it to pay bills, shop online, and store sensitive documents. You should fully protect yourself to lessen the chance of cybercriminals infiltrating your computer and your online...
PC security: Your essential software toolbox
When NASA loses laptops and phones, the data on them is usually unencrypted

Toshiba Tech's erasable toner lets you photo-uncopy (video)

www.engadget.com
Put away the matches, finally there's an eco-friendly way to get rid of those ill-thought photocopy pranks. Toshiba Tech has developed a toner that can be erased, letting you use a sheet of paper up to five times. Unlike similar solutions, you don't need special paper, but you will...
Toshiba Tech's erasable toner lets you photo-uncopy (video)
NASA finally demands encryption on employee machines after another laptop is stolen

Anonymous Leaks Marine Corps Massacre Case (Updated) [Hackers]

gizmodo.com
The bombs keep dropping from Anonymous—first local cops, then the FBI, and now the Marine Corps: sensitive documents from 2005's Haditha Killings trial. Anon doesn't think the Marine in charge should have gotten off so lightly. This is their payback. More »...
Anonymous Leaks Marine Corps Massacre Case (Updated) [Hackers]

Secrecy bids in Apple-Samsung patent lawsuit denied

news.cnet.com
Companies are trying to keep key portions of sensitive documents private, but Judge Koh rules their requests go too far. [Read more]...
Secrecy bids in Apple-Samsung patent lawsuit denied

Avalara buys Tax Technology Services

www.geekwire.com
Fast-growing Avalara is making another buy, purchasing Tax Technology Services for an undisclosed price. Avalara said in a release that the deal will extend its leadership in the area of sales tax exemption certificate management. Tax Technology Services is the maker of CertCapture, a service that acquires and maintains resale certificates,...
Avalara buys Tax Technology Services

Judge Will Let Kleiner Perkins Ask Again for Arbitration in Gender Discrimination Case

allthingsd.com
As promised, a judge today ruled against venture capital firm Kleiner Perkins Caufield & Byers in its efforts to compel its partner Ellen Pao to arbitrate her gender discrimination and retaliation suit. But the judge told Kleiner it could bring its motion back on more specific grounds, and set another...
Judge Will Let Kleiner Perkins Ask Again for Arbitration in Gender Discrimination Case

WikiLeaks Reveals Aaron Swartz May Have Been A Source: Wise Move?

www.techdirt.com
WikiLeaks currently finds itself in a difficult position. Funds are trickling in because of a questionable financial blockade against it, and Julian Assange is stuck in the Ecuadorian embassy in London. So it's understandable that it should want to take every opportunity to remind people that it is still around...
WikiLeaks Reveals Aaron Swartz May Have Been A Source: Wise Move?

Long Island cops probe how secret information became NYC confetti

arstechnica.com
On Monday, Long Island police officials told reporters they would investigate how internal police files ended up being used as confetti for the Macy’s Thanksgiving Day parade in New York City. Some strips were shown to have personal, identifiable information of cases including the officers involved. There were even details...
Long Island cops probe how secret information became NYC confetti

Prosecutor: Manning shared data without regard for national security

www.pcworld.com
U.S. Army Private First Class Bradley Manning accused of sharing thousands of classified government documents with WikiLeaks, knew that the information would aid enemies of the U.S., a prosecutor argued Monday.Manning, facing a court martial on 12 charges at Fort Meade, Maryland, endangered U.S. national security when he "systematically...
Prosecutor: Manning shared data without regard for national security

Companies explore self-detonating data as security control

www.networkworld.com
The popular Snapchat photo-messaging app used mainly by Android and iOS mobile device owners to share images that then self-destruct after 10 seconds is the sort of security idea that businesses say can help them secure online transactions with business partners. "It puts controls on what people see, and...
Companies explore self-detonating data as security control
LogMeIn's Dropbox Competitor Cubby Reveals Pricing; Stays Competitive At $7 Per Month For 100 GB

Microsoft to Withdraw Copyright Complaint, Cryptome Coming Back Online

www.readwriteweb.com
Great news from web hosting company Network Solutions this morning. A company representative tells us that Microsoft will withdraw the copyright complaint against long-time watchdog website Cryptome.org and the site will be back online later today. Yesterday Cryptome published a 22-page PDF called the Microsoft Global Criminal Compliance Handbook. Cryptome...
Microsoft to Withdraw Copyright Complaint, Cryptome Coming Back Online
Obama administration may launch criminal investigation into PRISM and Verizon court order leaks

What happens when you die?

www.extremetech.com
For the last few thousand years, death has been a very simple matter. Upon death, your assets would be divvied up according to your will. Historically, assets were almost entirely physical — cars, houses, antique tables, jewellery, gold bullion, notebooks, photo albums — but today that couldn’t be further from...
What happens when you die?

Bradley Manning Tried To Give Story To Major News Outlets

www.fastcompany.com
When that failed, the the US Army intelligence officer turned to Wikileaks. Bradley Manning tried to give his story to numerous major media outlets including the Washington Post, New York Times and Politico before turning over hundreds of sensitive documents to Wikileaks, he testified on Thursday. The testimony came...
Bradley Manning Tried To Give Story To Major News Outlets

A Day After Tackling CIA, Alabama Websites, Anonymous Knocks Interpol Offline

www.observer.com
A day after hacker collective Anonymous claimed credit for taking down the Central Intelligence Agency's site (cia.gov), a site related to Mexico's mining industry and a site run by the State of Alabama, Interpol.int has gone offline. The Friday hacks appeared to compromise emails and other sensitive documents: Read More...
A Day After Tackling CIA, Alabama Websites, Anonymous Knocks Interpol Offline

Twitter Hacker, Document Leaker, Arrested in France

www.readwriteweb.com
The AFP is reporting that the person who leaked internal business documents from Twitter Inc. to the blog TechCrunch last July is also the same person who compromised the Twitter accounts of Barack Obama and other celebrities last year. A 25 year old who went by the name "Hacker Croll"...
Twitter Hacker, Document Leaker, Arrested in France
Two of Alan Turing's wartime cryptography papers released

RoboTrolls Threaten Alleged BitTorrent Pirates With Lawsuit

torrentfreak.com
Starting two years ago, hundreds of thousands of BitTorrent users who allegedly shared films without the consent of copyright holders have been dragged to court in the US. The aim of the copyright holders, or copyright trolls, is never to take any of the cases to trial. Instead they want...
RoboTrolls Threaten Alleged BitTorrent Pirates With Lawsuit
AMD says former execs stole more than 100,000 secret documents before joining Nvidia

Perhaps The NSA Should Figure Out How To Keep Its Own Stuff Secret Before Building A Giant Database

www.techdirt.com
Apparently, the brilliant minds at the NSA are completely bewildered as to how Ed Snowden had access to everything he had access to. They don't think it's possible. Among the questions is how a contract employee at a distant NSA satellite office was able to obtain a copy of an...
Perhaps The NSA Should Figure Out How To Keep Its Own Stuff Secret Before Building A Giant Database

Middle East officials targeted by cyber espionage 'Madi' attackers

www.guardian.co.uk
Hacking group attacked critical infrastructure in Iran and Israel in eight-month spying campaignGovernment officials in the Middle East are among 800 victims of a sustained cyber espionage attack dubbed Madi targeting critical infrastructure in Iran and Israel, security experts have discovered.A sophisticated hacking group, whose members moved to Canada in...
Middle East officials targeted by cyber espionage 'Madi' attackers

Wikileaks leaks classified intelligence report about itself

arstechnica.com
Wikileaks, a Web site aims to boost government transparency and accountability by publishing sensitive documents, has released a classified military counterintelligence analysis report that discusses the "threat posed to the US Army" by Wikileaks itself. The report outlines this perceived threat and contends that the military security could be...
Wikileaks leaks classified intelligence report about itself
× Just a test of the new info bar. What do you think?