Darlene Storm

Darlene Storm (not her real name) is a freelance writer with a background in information technology and information security. It seems wise to keep an eye on new hacks and holes, to know what is possible and how vulnerable you might be. Most security news is about insecurity, hacking, cybersecurity and even privacy threats, bordering on scary. But when security is done right, it's a beautiful thing...sexy even. Security is sexy.

Detekt tool finds the Hacking Team's secret surveillance malware on PC

Anonymous wages cyberwar on the KKK with #OpKKK & #HoodsOff

Anonymous wages cyberwar on the KKK with #OpKKK & #HoodsOff

Anonymous has been waging cyberwar on the KKK after the hate group said it would use 'lethal force' on Ferguson protesters. The KKK threatened to shoot anyone wearing a Guy Fawkes (Anonymous) mask. The FBI warned there will likely be...

List of hacked government agencies grows: State Department, White House, NOAA & USPS

List of hacked government agencies grows: State Department, White House, NOAA & USPS

If whispers can be believed, then China is kicking cyber butt and taking names as the list of hacked government agencies grows to include the State Department, the White House, NOAA and USPS.

Slur digital market: Anonymously auction secrets, zero-days or blackmail for bitcoins

Slur digital market: Anonymously auction secrets, zero-days or blackmail for bitcoins

Slur is a new and dangerous digital marketplace for whistleblowers, disgruntled employees and psychopaths to anonymously sell the dirty secrets of governments and corporations, to peddle zero-days for bitcoins or to profit from...

BrowserStack hacked: Attacker sends email to customers alleging shoddy security

BrowserStack hacked: Attacker sends email to customers alleging shoddy security

After a hacker sent email to BrowserStack customers that claimed the company had no firewalls in place, stored passwords in plain text and other shoddy security practices, BrowserStack admitted it was hacked. Yet the company claims...

The best secure messaging apps that protect you from surveillance

The best secure messaging apps that protect you from surveillance

If you use Skype, SnapChat, Facebook chat, WhatsApp, or Google off-the-record chat, then it’s time for you to rethink your digital communications strategy and switch to other more secure messaging programs. The EFF evaluated 39...

FBI Director Comey on needing access to dark encrypted closets where monsters hide

FBI Director Comey on needing access to dark encrypted closets where monsters hide

In a series of recent speeches, FBI Director James Comey discussed fighting monsters, the militarization of police, online terrorist propaganda, the risk of Going Dark due to encryption and how we need to stop before the U.S. becomes...

Verizon bans domestic surveillance and net neutrality articles from tech news site

Verizon bans domestic surveillance and net neutrality articles from tech news site

Know where you won't hear about Verizon injecting a privacy-decimating 'perma-cookie' in consumers' HTTP connections so advertisers can track Verizon customers across the web? SugarString, Verizon's tech news site, where writers are...

Zero-day in Samsung ‘Find My Mobile’ service allows attacker to remotely lock phone

Zero-day in Samsung ‘Find My Mobile’ service allows attacker to remotely lock phone

NIST warned that if an attacker exploits the zero-day vulnerability in Samsung's ‘Find My Mobile’ service, then the hacker can remotely lock, unlock and ring the phone.

DHS investigates 24 potentially deadly cyber flaws in medical devices

DHS investigates 24 potentially deadly cyber flaws in medical devices

DHS is investigating 24 potentially deadly cybersecurity flaws in medical devices like infusion pumps, implantable heart devices, medical imaging equipment and hospital networking systems.

Chinese Big Brother launches nationwide attack on iCloud

Chinese Big Brother launches nationwide attack on iCloud

Since the iPhone 6 launched in China, Chinese authorities have been staging a man-in-the-middle attack, via a self-signed digital certificate, so when Chinese users connect to iCloud.com, they are instead redirected to a spoofed...

Got a Mac? Prevent OPSEC leakage by cleaning hidden OS X files from USB drives

Got a Mac? Prevent OPSEC leakage by cleaning hidden OS X files from USB drives

If you plug a USB drive into OS X and use the Finder app to browse and change sort order, then you may have an OPSEC problem. Apple knows about the issue, and came up with a work around starting with OS X Tiger; but while Apple...

Load More
+