Darlene Storm

Darlene Storm (not her real name) is a freelance writer with a background in information technology and information security. It seems wise to keep an eye on new hacks and holes, to know what is possible and how vulnerable you might be. Most security news is about insecurity, hacking, cybersecurity and even privacy threats, bordering on scary. But when security is done right, it's a beautiful thing...sexy even. Security is sexy.


Google's first vertical Street View lets you ascend 3,000 feet up Yosemite's El Capitan

Google's first vertical Street View lets you ascend 3,000 feet up Yosemite's El Capitan

Forget Apple's El Capitan for moment as Google's first vertical Street View takes you 3,000 feet up Yosemite National Park's El Capitan granite monolith.

Hackers allegedly attack Polish LOT airline, 10 flights and over 1,400 people grounded

Hackers allegedly attack Polish LOT airline, 10 flights and over 1,400 people grounded

After Polish airline LOT suffered an IT attack on ground operation systems, 10 flights were canceled, another dozen were delayed and over 1,400 passengers were grounded at Warsaw Chopin Airport. LOT said the attack on its...

Vulnerability in Samsung Galaxy phones put over 600 million Samsung phone users at risk

Vulnerability in Samsung Galaxy phones put over 600 million Samsung phone users at risk

Samsung pre-installed the Swift keyboard which has a vulnerability that could allow an attacker to remotely tap into GPS, camera and microphone, eavesdrop on text messages and calls and more. NowSecure listed Galaxy S6, S5, S4 and S4...

Will banks allow four emojis to replace PIN numbers?

Will banks allow four emojis to replace PIN numbers?

Will banks let customers use emojis instead of numeric PINs? A UK firm says yes, because emojis would be harder to hack yet easier to remember.

Vital engine software files accidentally wiped, linked to fatal A400M plane crash

Vital engine software files accidentally wiped, linked to fatal A400M plane crash

'Accidental data wipe' of vital files that controlled military A400M aircraft engines has been connected to the fatal plane crash.

MEDJACK: Hackers hijacking medical devices to create backdoors in hospital networks

MEDJACK: Hackers hijacking medical devices to create backdoors in hospital networks

Attackers are infecting medical devices with malware and then moving laterally through hospital networks to steal confidential data, according to TrapX’s MEDJACK report.

Surveillance by FBI's fleet of spy planes raises privacy questions

Surveillance by FBI's fleet of spy planes raises privacy questions

Surveillance by the FBI's fleet of spy planes, which are registered to shell companies and fitted with tech capable of sucking up cellphone data from innocent Americans, raises serious privacy questions.

Russia Photoshopped satellite images to blame Ukraine for shooting down MH17: report

Russia Photoshopped satellite images to blame Ukraine for shooting down MH17: report

After a team of investigators conducted forensic analysis of satellite images provided by the Russian government as "proof" that Ukraine shot down Malaysia Airlines Flight MH17, the group found the images to be digitally altered and...

Use Facebook Messenger? Marauders Map app can pinpoint your location to within 3 feet

Use Facebook Messenger? Marauders Map app can pinpoint your location to within 3 feet

Stalkers will likely rejoice as a new app can help them do more than creep on Facebook friends as it can pinpoint the precise location of non-friends if they use Messenger to post to the same group and the sender hasn't disabled...

Google's Internet-connected toys patent sparks privacy concerns, visions of IoT Chucky

Google's Internet-connected toys patent sparks privacy concerns, visions of IoT Chucky

Google's recently published patent for Internet-connected toys, which have microphones, cameras, speakers and motors, have sparked privacy concerns; the 'creepy' anthropomorphic devices might look like a doll or teddy bear; but some...

Researchers create app to stop RIG attacks on Android and Android-based IoT devices

Researchers create app to stop RIG attacks on Android and Android-based IoT devices

Researchers, who said there is an urgent need to mitigate runtime-information-gathering (RIG) attacks on Android mobile and Android-controlled Internet of Things devices, presented 'Leave Me Alone: App-level Protection Against Runtime...

Load More