White hat hackers target the iPhone (Philip Elmer-DeWitt/Apple 2.0)

Philip Elmer-DeWitt / Apple 2.0:
White hat hackers target the iPhone  —  How secure is your smartphone?  We may find out next month.  —  Hackers and computer security experts gathering on March 18 in Vancouver, British Columbia, for the third annual Pwn2Own contest will be targeting five smartphones: an Apple (AAPL) …

Source: White hat hackers target the iPhone (Philip Elmer-DeWitt/Apple 2.0)

Why I employed a felon (Jason Calacanis/The Jason Calacanis Weblog)

Jason Calacanis / The Jason Calacanis Weblog:
Why I employed a felon  —  Yesterday, I joined one of our Mahalo employees at Federal District Court as he was sentenced to 48 months in jail for crimes related to computer security.  —  Before my employee John Schiefer was sentenced, a violent career criminal was facing 60 months for beating up a prison guard.

Source: Why I employed a felon (Jason Calacanis/The Jason Calacanis Weblog)

Data about Obama's helicopter breached via P2P? (Charles Cooper/CNET News)

Charles Cooper / CNET News:
Data about Obama’s helicopter breached via P2P?  —  An Internet security company claims that Iran has taken advantage of a computer security breach to obtain engineering and communications information about Marine One, President Barack Obama’s helicopter, according to a report by WPXI, NBC’s affiliate in Pittsburgh.

Source: Data about Obama's helicopter breached via P2P? (Charles Cooper/CNET News)

Borg-like cybots may patrol government networks (Mark Rutherford/CNET News)

Mark Rutherford / CNET News:
Borg-like cybots may patrol government networks  —  The Oak Ridge National Laboratory has created software that uses colonies of borg-like cyberrobots it says will help government agencies detect and fend off attacks on the nation’s computer network infrastructure.

Source: Borg-like cybots may patrol government networks (Mark Rutherford/CNET News)