Security Essentials Updated to Show XP EOS Warnings

Microsoft is really keen on killing Windows XP on April 8 and in addition to notifications displayed right on the desktop to tell users that support is coming to an end, the company has also updated Security Essentials to display upgrade warnings.


China blames US for a third of all hacks on its computers

Almost 11 million computers had been compromised by overseas-based servers, mostly from the US


Windows Malware using Powershell

Most significantly, instead of creating or including executable code, CRIGENT uses the Windows PowerShell to carry out its routines. PowerShell is a powerful interactive shell/scripting tool that is available for all current versions of Windows (and is built-in from Windows 7 onwards);


Top of skull replaced with 3D “printed” partial cranium

Due to chronic bone disease the patient required a partial replacement, do not follow the link if you are squeamish.


Office for the iPad Review

As I had expected, Office for iPad fills a useful niche between Office Mobile for smart phone handsets and the more full-featured Office we see in Windows and on the Mac


Microsoft Windows 0-day, Don’t open unexpected RTF documents.

The in the wild exploit takes advantage of an unspecified RTF parsing vulnerability combined with an ASLR bypass, which depends by a module loaded at predictable memory address.


How Much Microsoft Charges the FBI for User Data

Long story short, Microsoft charges the FBI (read: taxpayers) hundreds of thousands of dollars a month for access to information about you. And their rates are on the rise.


Megaupload loses bid to see more US evidence

New Zealand’s Supreme Court found the U.S. does not have to provide full documents in its extradition bid


Facebook HACK language

a programming language we developed for HHVM that interoperates seamlessly with PHP


WPA2 wireless security cracked

However, it is the de-authentication step in the wireless setup that represents a much more accessible entry point for an intruder with the appropriate hacking tools. As part of their purported security protocols routers using WPA2 must reconnect and re-authenticate devices periodically and share a new key each time.