NT OBJECTives Confirms Yahoo! Fantasy Football Mobile Application Vulnerability

Is Your Mobile App Ready for Some Football? Web Application Security Firm NT OBJECTives Confirms Yahoo! Fantasy Football Mobile Application Vulnerability
The Latest NSA Revelations

Yesterday, there was news that The Guardian had shared 50,000 pages of NSA documents released by Edward Snowden with the New York Times, some of which showed that the NSA are able to foil basic safeguards of privacy on the web.
FBI adds Syrian Electronic Army to wanted list

The Federal Bureau of Investigation has added the Syrian Electronic Army (SEA), an active group of hackers sympathetic to the government of Syrian President Bashar Assad, to its list of wanted criminals.
Car computer hackers can slam on your brakes at freeway speeds

As cars become more like PCs on wheels, what’s to stop a hacker from taking over yours?
N.S.A. Able to Foil Basic Safeguards of Privacy on Web

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion
EHR and mobile device auditing, security requires vigilance

If you need a few reasons to adapt to the latest security advancements, just look at the calendar for September and circle the “23”.
Darknets, wargames and Raspberry Pi at first-ever Balkan hacker conference

Because hackers are under such scrutiny and debate right now, and because hackers have literally changed the world we live in – as well as royally pissed off so many people – we know that this is leading somewhere.
Snowden claims US & UK routinely hack banking, medical & email records

Fugitive US whistlebower Edward Snowden has made a fresh round of disclosures following his temporary asylum in Russia
Howto Crawl web.xml With Ruby to Discover Servlet Urls for a Pentest

Something very boring happening in a web application penetration test is to reach out URLs that are not referenced in other pages.
Your nicked iPad now likelier than ever to show up in Mongolia

The number of laptops and tablets stolen in one country and recovered in another is on the rise.