Darlene Storm

Darlene Storm (not her real name) is a freelance writer with a background in information technology and information security. It seems wise to keep an eye on new hacks and holes, to know what is possible and how vulnerable you might be. Most security news is about insecurity, hacking, cybersecurity and even privacy threats, bordering on scary. But when security is done right, it's a beautiful thing...sexy even. Security is sexy.

How will new device to help cops detect texting drivers know it wasn't the passenger?

FBI hunting ISISGang hackers & gamers creating Cops episodes by swatting other gamers

FBI hunting ISISGang hackers & gamers creating Cops episodes by swatting other gamers

The FBI is allegedly hunting British hackers from the ISISGang for swatting, for using Skype to make terrorist threat “prank calls” that threatened schools with shootings and bombings. Sadly such hoax phone calls are becoming more...

Did the FBI violate CFAA by hacking to find Silk Road's server?

Did the FBI violate CFAA by hacking to find Silk Road's server?

Some security experts say the FBI's explanations for how it obtained the "leaked" IP address for Silk Road's misconfigured server are "impossible" and stink like the truth shouldn't. Legally, the DOJ claims the methods for finding the...

Healthcare.gov hacked? If only someone had warned it was hackable...Oh wait

Healthcare.gov hacked? If only someone had warned it was hackable...Oh wait

Malware was uploaded to a healthcare.gov test server that was not supposed to be connected to the Internet and was secured with the manufacturer's default password. But don't sweat it, we're told, as nothing was stolen and it only...

Will iCloud 'hack' help kill online security questions?

Will iCloud 'hack' help kill online security questions?

There is no such thing as a "private naked selfie" and the situation is not improved by Apple's online security questions. Kevin Rose is the latest to say it's time to kill such security questions. "If that's the best way we have of...

Are your calls being intercepted? 17 fake cell towers discovered in one month

Are your calls being intercepted? 17 fake cell towers discovered in one month

CryptoPhone users found 17 fake “cell towers” in a month, but don’t know who deployed them or why. Most phones don’t show any signs that they are a target of stingray surveillance, such as when users’ calls are recorded, texts spoofed...

Did you know Google's self-driving cars can't handle 99% of roads in the US?

Did you know Google's self-driving cars can't handle 99% of roads in the US?

While there is a lot to be excited about when it comes to driverless cars, Google's self-driving cars can't handle heavy rain, snow, unmapped traffic lights or stop signs. In other words, it is incapable of driving in nearly 99% of...

Feds issue bulletin warning about malicious 'Google dorking' cyber actors

Feds issue bulletin warning about malicious 'Google dorking' cyber actors

While it seems years too late, DHS, FBI and NCTC issued a bulletin warning website admins about malicious cyber actors using Google dorking advanced search techniques to find sensitive info and vulnerabilities that can be exploited...

New attacks secretly use smartphone cameras, speakers and microphones

Do you regard your smartphone cameras and speakers as a security threat? You might after checking out presentations from the 8th USENIX Workshop on Offensive Technologies (WOOT). If you were a target, you would neither see, nor...

Cracking smart house devices & pwning thousands of PCs via VNC remote access

Cracking smart house devices & pwning thousands of PCs via VNC remote access

Pen testers cracked the security of every IoT device within a smart house. Other researchers scanned the Internet and grabbed 30,000 screenshots in an hour of PCs running VNC without a password. Moral of the story? Change default...

Your PC or laptop may have a backdoor enabled by default, millions do

Computrace software, which is enabled by default on millions of PCs, could allow attacker to remotely wipe the hard drive. Researchers described the "backdoor" in BIOS/UEFI, as well as how it can be exploited at Black Hat USA....

Black Hat: Nest thermostat turned into a smart spy in 15 seconds

No, the Nest thermostat can't be remotely hacked. But you might think twice about buying one from somewhere other than Nest since a persistent backdoor can be added in about 15 seconds...a backdoor that you would have no way of...

Load More