Darlene Storm

Darlene Storm (not her real name) is a freelance writer with a background in information technology and information security. It seems wise to keep an eye on new hacks and holes, to know what is possible and how vulnerable you might be. Most security news is about insecurity, hacking, cybersecurity and even privacy threats, bordering on scary. But when security is done right, it's a beautiful thing...sexy even. Security is sexy.

Two state election systems attacked, FBI suspects ‘foreign hackers’

Baltimore cops using private company's aerial cameras to conduct secret surveillance

Baltimore cops using private company's aerial cameras to conduct secret surveillance

Persistent Surveillance Systems mount cameras on a Cessna and fly for hours above Baltimore to conduct surveillance likened to Google Earth with TiVo capabilities; Baltimore police have not publicly disclosed the unblinking...

Malware alert: Dump on WikiLeaks contained over 3,000 malicious files

Malware alert: Dump on WikiLeaks contained over 3,000 malicious files

Malware expert Vesselin Bontchev discovered 323 malware instances in his first scan of WikiLeaks' email dump from Turkey’s ruling political party; he listed 3,277 in his second report. WikiLeaks quietly 'neutered' some of the malware....

1.4 billion Android devices vulnerable to hijacking thanks to Linux TCP bug

1.4 billion Android devices vulnerable to hijacking thanks to Linux TCP bug

8 out of 10 Android devices vulnerable to spying since they are vulnerable to the Linux TCP bug.

Hacking group purportedly hacked NSA-linked Equation Group, auctioning cyber weapons

Hacking group purportedly hacked NSA-linked Equation Group, auctioning cyber weapons

A group going by the Shadow Brokers claim to have hacked the Equation Group, which is believed to be linked to the NSA, and is auctioning off the 'best' cyber weapons.

Thugs developing cat-themed ransomware for Androids and Hitler ransomware for PCs

Thugs developing cat-themed ransomware for Androids and Hitler ransomware for PCs

Cat-themed ransomware targeting Androids can encrypt files and silently steal text messages; Hitler ransomware targeting PCs demands payment via a gift card; after one hour, the user's files are deleted.

Hackers demonstrated first ransomware for IoT thermostats at DEF CON

Hackers demonstrated first ransomware for IoT thermostats at DEF CON

Ransomware-infected smart thermostats, it's no longer hypothetical. An attacker could crank up the heat and lock the IoT device until a ransom was paid to unlock it.

$6 device can break into hotel rooms and infect PoS systems

$6 device can break into hotel rooms and infect PoS systems

At DEF CON, a researcher will unveil a small $6 device which can be used to duplicate every keycard in a hotel, so an attacker could break into every room, as well as to infect point-of-sale systems.

Russia: Hey, don’t blame us, 20 of our government organizations were hacked too

Russia: Hey, don’t blame us, 20 of our government organizations were hacked too

As the FBI starts investigating a cyberattack on the DCCC, Russia claims 20 of its government organizations were hacked too.

KeySniffer: Hackers can snag wireless keyboard keystrokes from 250 feet away

KeySniffer: Hackers can snag wireless keyboard keystrokes from 250 feet away

From hundreds of feet away, attackers can see everything that is being typed as well as type directly on a PC due to flawed wireless keyboards from at least eight vendors.

Schneier: Next president may face IoT cyberattack that causes people to die

Schneier: Next president may face IoT cyberattack that causes people to die

With IoT and cyber-physical systems becoming the new normal, respected security guru Bruce Schneier suggested the next president may face 'a large-scale internet disaster that kills multiple people.'

Your router won’t protect you when smartphones attack smart homes

Your router won’t protect you when smartphones attack smart homes

Your home router, or firewall, won't protect you when smartphones attack smart homes.

Load More