Facebook/MySpace Worm on the loose!

Taken from Aviv_Revach’s blog: This morning I’ve received a notification email from Facebook, notifying me that my friend Asaf left me a new message on my wall. This seemed to be OK until I read the message: “hello Arik, hehe.. you could be tht naughty i didnt knw..really hard to see tht from my eyes […]

Digital Paper

The dot pattern is a kind of two dimensional barcode; the most common is the proprietary Anoto pattern. In the Anoto pattern, each dot is spaced about 0.3mm apart; the full pattern consists of 669,845,157,115,773,458,169 dots, and encompasses an area exceeding 4.6 million km² (this corresponds to 73 trillion sheets of letter-size paper). The complete […]

Backtrack – Hack Attack

Ever wondered just how secure your WEP protected wireless network is? Well today I’ll show you how to test it. There have been a lot of articles written about this subject already and by now it is common knowledge that WEP is only the barest of security precautions. I’m going to show you how you […]

Hackers return to MACs

All the best hackers I know are gradually switching to Macs. My friend Robert said his whole research group at MIT recently bought themselves Powerbooks. These guys are not the graphic designers and grandmas who were buying Macs at Apple’s low point in the mid 1990s. They’re about as hardcore OS hackers as you can […]

Company blog

Hello Dear Interested Browser 🙂 Please hang on tight, as we get this site up and running properly! TeamXMM,

Definition of Security

Computer security is a branch of information security applied to both theoretical and actual computer systems. Computer security is a branch of computer science that addresses enforcement of ‘secure’ behavior on the operation of computers. The definition of ‘secure’ varies by application, and is typically defined implicitly or explicitly by a security policy that addresses […]