Darlene Storm

Darlene Storm (not her real name) is a freelance writer with a background in information technology and information security. It seems wise to keep an eye on new hacks and holes, to know what is possible and how vulnerable you might be. Most security news is about insecurity, hacking, cybersecurity and even privacy threats, bordering on scary. But when security is done right, it's a beautiful thing...sexy even. Security is sexy.

Hack a car in Michigan, go to prison for life if new bill becomes law

Most breaches are still caused by PEBKAC and ID10T errors like falling for phishing

Most breaches are still caused by PEBKAC and ID10T errors like falling for phishing

Open. Clickety click. Pwned. Humans are still the weak security link, falling for phishing even more often than before, which leads to breaches.

Dogspectus: Android ransomware silently installs, demands $200 iTunes gift card ransom

Dogspectus: Android ransomware silently installs, demands $200 iTunes gift card ransom

Dogspectus is a ransomware that silently installs on Android devices, via malvertising and a Hacking Team exploit, then demands a ransom of $200 in iTunes gift cards.

Algorithm predicted who will bite the dust next in Game of Thrones

Algorithm predicted who will bite the dust next in Game of Thrones

Students at the Technical University of Munich have created an algorithm which predicts the likelihood of death percentage for Game of Thrones characters. If you think computer-generated guesses will be accurate, then this article...

Hackers only need your phone number to eavesdrop on calls, read texts, track you

Hackers only need your phone number to eavesdrop on calls, read texts, track you

Thanks to a flaw in the cellular network SS7 protocol, an attacker just needs your phone number to listen to your calls, read your texts and track you. 60 Minutes showed how hackers only needed a congressman's phone number to record...

Cryptoworms: The future of ransomware hell

Cryptoworms: The future of ransomware hell

If you think ransomware is growing problem now, then the cryptoworms that are 'right around the corner' and described as the future of ransomware by researchers sound like a living hell.

Petya ransomware cracked: Get password to decrypt hard drive for free

Petya ransomware cracked: Get password to decrypt hard drive for free

The Petya ransomware lock screen warned that your hard drive was encrypted with a military grade encryption algorithm and the only way to unlock it was to cough up the bitcoins to purchase a decryption key. But that’s no longer true;...

FBI, DEA and ICE are top Cellebrite customers so far in 2016

FBI, DEA and ICE are top Cellebrite customers so far in 2016

Here's a list of the government customers of Cellebrite so far in 2016.

Copyright cops want ISPs to hijack pirate's browser until ransom fine is paid

Copyright cops want ISPs to hijack pirate's browser until ransom fine is paid

Rightscorp's Scalable Copyright scheme involves ISPs hijacking the browser of alleged pirates until the copyright infringement fine is paid.

1,418 remotely exploitable flaws found in automated medical supply system

1,418 remotely exploitable flaws found in automated medical supply system

There are over 1,400 remotely exploitable flaws in Pyxis SupplyStation systems; many of those vulnerabilities, ICS-CERT warned, "an attacker with low skill would be able to exploit." The vulnerabilities are in seven third-party...

VNC Roulette: Prepare to be hacked if you don't use a password for VNC

VNC Roulette: Prepare to be hacked if you don't use a password for VNC

If you don't use a password for VNC, don't be surprised if your desktop and IP show up on VNC Roulette. By choosing to use no authentication to secure your VNC connection, some people might take that as a 'please hack me' invitation.

FBI reportedly to use Cellebrite to crack encrypted San Bernardino iPhone

FBI reportedly to use Cellebrite to crack encrypted San Bernardino iPhone

Cellebrite, a company which could suck the data off cellphones in under two minutes several years back, is reportedly the firm helping the FBI crack the San Bernardino shooter's iPhone.

Load More