Stories by Tony Bradley

Dangerous WebGL flaws haunt Chrome and Firefox

Context -- an independent information security consultancy -- has published a new report on security flaws with WebGL. The report, "WebGL -- More WebGL Security Flaws", includes a video clip demonstrating why organizations should think twice about relying on Web browsers built on WebGL.

We owe LulzSec a thankyou

LulzSec has been making headlines on a virtually daily basis for a month or so now. The hacker group has compromised servers and exposed sensitive information from targets ranging from Sony, to PBS, to the FBI, and has even set up a hotline to take requests for which sites to attack next. The irony of the LulzSec hacks, though, is that the group is doing us all a favour whether they intend to, or not.

Nokia wins patent war with Apple -- you're next Android

Don't put any dirt on Nokia's coffin just yet--the company still has some life in it. A victory in its patent war with Apple means a new revenue stream for Nokia, and a stronger position to enforce its patent portfolio with other mobile device makers.

Will iCloud crush rival Cloud storage services?

Apple iCloud is coming. Existing online storage and data syncing services like Box.net, Dropbox, and SugarSync may have cause for concern because iCloud encroaches on their territory, and could threaten to make smaller rivals obsolete.

iCloud raises serious data security concerns

One of the biggest announcements from Apple at this week's Worldwide Developers Conference (WWDC) was the unveiling of iCloud. One crucial element was missing from the Apple magic show, though -- will the data be secure?

Sony Hacked Again: How Not to Do Network Security

Yes. As unbelievable as it may seem, Sony was hacked again. It is not (entirely) Sony's fault that it is the target du jour for hackers everywhere. But, it is Sony's fault that its networks and servers seem to be trivial to hack and easy to pwn.

Apple iCloud: An iOS user's wish list

The iCloud has gone from rumor, to speculation, to confirmed service. Now we just need the details. What will it do? How much will it cost? Just how magical will it be? Well, I don't have any privileged insight, but here are my predictions (a.k.a. "wish list") for what to expect from the iCloud.

How not to do Twitter: The rise and fall of my Twitterverse

I came a little late to the Twitter party. Once I embraced the basic concept, I set out to build a massive Twitter following -- in all the wrong ways, and for all the wrong reasons. If you are new to Twitter, or trying to gain Twitter followers, perhaps you can learn from my mistakes.

Day 4: Tweaking the look and layout of Ubuntu Linux

People don't like change. One of the things that some people get hung up on is the look and feel of the desktop. More precisely, some Windows users who look at Ubuntu Linux get hung up on how it doesn't look and feel like Windows. Well, it isn't that difficult to customize the look and feel of Ubuntu Linux to make it be whatever you want it to be.

Nintendo servers hacked, you're next Xbox

Nintendo reports that a Web server for its U.S. unit was hacked. The attack on Nintendo shows that this new era of hacking isn't going to end any time soon, and should serve as a wakeup call for other companies that were hoping this was purely a Sony issue.

Malware spikes, spam plummets, says report

It has been the busiest quarter on record for malware according to a new report from McAfee. The McAfee Threats Report: First Quarter 2011 claims six million unique malware samples were recorded during the first quarter of 2011, and also points out that spam traffic is down, and mobile malware threats are on the rise.

Google Wallet security has a weakness

Google unveiled details of Google Wallet this week. Google Wallet is an ambitious mobile payment plan designed to let your Android smartphone be your wallet, but you should consider very carefully just how secure your credit card data will be in Google Wallet.

[]