EEV: _ Very Well Placed Malware_ Trojan stashes config files in photos in mythology mash-up By Iain Thomson Posted in Security, 20th February 2014 20:12 GMT A new variant of the bank-account-raiding Zeus malware apparently uses the ancient technique of steganography to… Read More ›
Uniform Resource Locator
How The NSA Deploys Malware: An In-Depth Look at the New Revelations
We’ve long suspected that the NSA, the world’s premiere spy agency, was pretty good at breaking into computers. But now, thanks to an article by security expert Bruce Schneier—who is working with the Guardian to go through the Snowden documents—we… Read More ›
International Counterfeit Drug Ring Hit in Massive Sting / 1,677 illegal pharmacy Web Sites claiming to be CVS, Walgreens etc..
Pill of Goods: International Counterfeit Drug Ring Hit in Massive Sting Court documents review process that led the FDA to shut down more than 1,600 illegal pharmacy Web sites By Dina Fine Maron | Wednesday, July 3, 2013 | 5 Pill… Read More ›
Research shows the New York City ban on large-sized drinks may have unintended consequences
Contact: Souri Somphanith onepress@plos.org 415-624-121-7199 Public Library of Science People buy more soda when offered packs of smaller sizes than if buying single large drink Restricting soda servings may induce people to buy more soda than when offered larger sized… Read More ›
How many scientists fabricate and falsify research? : 72% knew someone
2009 study posted for filing Contact: Rebecca Walton rwalton@plos.org 44-122-346-3333 Public Library of Science Press release from PLoS ONE It’s a long-standing and crucial question that, as yet, remains unanswered: just how common is scientific misconduct? In the online, open-access… Read More ›
Hacker catches Facebook registering private links as ‘likes’
If you’ve sent Facebook friends a link to something out on the wilds of the World Wide Web, the social network knows and they’re telling others about it. A video published online this week by a poster on Hacker News… Read More ›