Are online comments full of paid lies?

Taiwan’s Fair Trade Commission this week fined Korean conglomerate Samsung $340,000 for “astroturfing.”
Hackers use Buffer to Send Out Spam on Twitter and Facebook

Buffer, a social media app, allows its users to schedule and automatically post updates to social media sites such as Facebook and Twitter.
LinkedIn’s Email Proxy Scheme Described as Man-in-the-Middle Attack

Professional networking giant LinkedIn is the subject of much criticism for its new LinkedIn Intro offering for lapses in privacy and security, and is being described as the equivalent to a Man-in-the-Middle (MitM) attack.
How one small American VPN company is trying to stand up for privacy

In recent months, I’ve started to take my own digital security much more seriously. I encrypt my e-mail when possible, I’ve moved away from Gmail, and I’ve become much more vigilant about using a VPN nearly all the time.
PHP.net resets passwords after malware-flinging HACK FLAP

The team behind popular web programing site PHP.net is in the process of restoring services and tightening security in the aftermath of a hack that exposed visitors to JavaScript-based exploits.
10 Pitfalls Of IT Risk Assessment

As IT organizations seek to make better risk-based decisions about security practices, perhaps the number one component for success is the IT risk assessment.
Tech vendors have role in Internet governance

At the Internet Governance Forum 2013 in Bali this week, I caught up with Joe Alhadeff, chair of the ICC Commission for digital economy, and who is also Oracle’s privacy lead.
Andrew Case on Digital Forensics and Incident Response

Digital forensics refers to the processes involved in examining data from harddrives, volatility memory (RAM), network captures, and a wide range of digital devices for artifacts that remain after specific actions occurred on a system.
Google fights for Internet freedom with new tools

In a move to fight back against governments that try to block their citizens’ Internet access, Google released tools to keep people around the world online.
To Determine Threat Level, Context Matters

While many security professionals are ready to toss Java–the favored target of attackers’ exploitation efforts–out of the enterprise, business decision makers often fall back on classifying the software as a business necessity.