Darlene Storm

Darlene Storm (not her real name) is a freelance writer with a background in information technology and information security. It seems wise to keep an eye on new hacks and holes, to know what is possible and how vulnerable you might be. Most security news is about insecurity, hacking, cybersecurity and even privacy threats, bordering on scary. But when security is done right, it's a beautiful thing...sexy even. Security is sexy.

UK researchers shatter world record by hitting 5G speeds of 1Tb per second

200 virtual line jumpers exploited 'technical backdoor' to score Burning Man tickets

200 virtual line jumpers exploited 'technical backdoor' to score Burning Man tickets

Nearly 80,000 people were waiting in a virtual line queue to purchase 40,000 Burning Man 2015 tickets. About 200 techies allegedly 'exploited' a backdoor in the ticketing system to cut in front of other Burners in line and buy the...

Mall security guards allegedly misuse CCTV to stalk women and share 'sleaze file' photos

Mall security guards allegedly misuse CCTV to stalk women and share 'sleaze file' photos

Security guards in Australia's Westfield Sydney shopping center are accused of stalking women via the mall's CCTV before tagging, saving and sharing secret 'sleaze file' photos.

Climate researcher claims CIA asked about weaponized weather: What could go wrong?

Climate researcher claims CIA asked about weaponized weather: What could go wrong?

The Pentagon claimed climate change is a national security issue, but even as a panel of experts suggest real-world geoengineering tests to change the climate, a climate scientist claims the CIA asked if a country controlling the...

Of 10 IoT-connected home security systems tested, 100% are full of security FAIL

Of 10 IoT-connected home security systems tested, 100% are full of security FAIL

The Internet of Things space is the new Wild West and home security systems are not nearly as secure as you may think; in fact, HP researchers tested 10 of the newest home security systems and discovered IoT-connected home security...

ISIS is a virus that Anonymous plans to cure: Hacktivists hammer ISIS with #OpISIS

ISIS is a virus that Anonymous plans to cure: Hacktivists hammer ISIS with #OpISIS

Anonymous launched #OpISIS, waging cyberwar against ISIS propaganda-spewing social media accounts and jihadist militant recruitment sites.

Detecting zero-day hack in one millisecond with 'power fingerprinting'

Detecting zero-day hack in one millisecond with 'power fingerprinting'

A company claims its tech can detect a zero-day hack in one millisecond by monitoring the 'power fingerprint' of a system or device. Testing in cooperation with the Department of Energy, PFP Cybersecurity tech detected Stuxnet even...

Hacker hijacks wireless Foscam baby monitor, talks and freaks out nanny

Hacker hijacks wireless Foscam baby monitor, talks and freaks out nanny

This is the third time news has circulated about some jerk hijacking a wireless Foscam camera/baby monitor and made his virtual intrusion known by talking. Please change the default password!

Drones infected with malware can drop from the sky or be hijacked for surveillance

Drones infected with malware can drop from the sky or be hijacked for surveillance

A security engineer infected a Parrot AR Drone with Maldrone malware, which creates a persistent backdoor, so an attacker can remotely control the infected drone, cause it to drop from the sky, be hijacked for surveillance, or spread...

Malaysia Airlines claim DNS hijacked, site not hacked, but attackers threaten data dump

Malaysia Airlines claim DNS hijacked, site not hacked, but attackers threaten data dump

Lizard Squad and Cyber Caliphate hacker groups hijacked the DNS of Malaysia Airlines, so that visitors to the URL saw two different '404 Not Found' defacements. Yet Malaysia Airlines claimed its 'website was not hacked' and customer...

Obama's cybersecurity plan: Share a password, click a link, go to prison as a hacker

Obama's cybersecurity plan: Share a password, click a link, go to prison as a hacker

Under President Obama's proposed cybersecurity plans and CFAA amendments, you could be considered a hacker for innocent behavior like sharing your Netflix password with family members or clicking a link that contains unauthorized...

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets

Leaked documents indicate that the NSA was in North Korean systems but didn't warn Sony about the attack, covertly uses innocent victims’ infected PCs when hijacking botnets, as well as secretly redirecting blame to scapegoats and...

Load More
+