News & Publications
Send media inquiries to email@example.com
Thomas Fox-Brewster April 17, 2015
Google GOOGL +0.47% appears to be an indomitable force. But, with today’s release from the US military’s research arm of its Memex search technologies and Europe’s competition investigation into the Mountain View giant, it might be a propitious time for tech-minded entrepreneurs to start building a Google killer.
Thomas Fox-Brewster April 10, 2015
The Memex technology has already been put to use by a number of law enforcement agencies, who are looking to counter crime taking place on networks like Tor, where Hidden Services are protected by the privacy-enhancing, encrypted hosting, often for good, often for bad.
James H. Hamlyn-Harris March 15, 2015
Hacking is a state of mind. Traditionally, hackers like to discover, understand and share the secrets they expose. They like to laugh at the dumb things they find. They’re not necessarily in it for the money, more so for the glory of mastering the arcane technicalities of computing.
John Leyden August 14, 2013
Botnets have been the main vector of cybercrime for more than a decade, so the possibility that a different approach might be brought into play is possibly as significant as when spammers switched from using open mail relays to malware-infected PCs.
John Leyden February 21, 2013
The founder of a project that aims to offer a global web application vulnerability scanner has defended the potentially controversial technology. The tech is a useful tool to check the security of websites you use for shopping.