Darlene Storm

Darlene Storm (not her real name) is a freelance writer with a background in information technology and information security. It seems wise to keep an eye on new hacks and holes, to know what is possible and how vulnerable you might be. Most security news is about insecurity, hacking, cybersecurity and even privacy threats, bordering on scary. But when security is done right, it's a beautiful thing...sexy even. Security is sexy.

Leak: Secret Facebook rules on what violence, self-harm and child abuse can be posted

Hackers reportedly hold Disney's newest Pirates of the Caribbean film for ransom

Hackers reportedly hold Disney's newest Pirates of the Caribbean film for ransom

Hackers have reportedly threatened to release 'Pirates of the Caribbean: Dead Men Tell No Tales' if Disney won't pay the ransom.

WikiLeaks posts user guides for CIA malware implants Assassin and AfterMidnight

WikiLeaks posts user guides for CIA malware implants Assassin and AfterMidnight

WikiLeaks released user guides for CIA malware implants Assassin and AfterMidnight which target Windows PCs.

Schools in Alabama warn parents about Blue Whale ‘suicide game’ app

Schools in Alabama warn parents about Blue Whale ‘suicide game’ app

It's not an urban legend, but a sick game spread over 50 days with the last task assigned by the 'master' to delete all proof and commit suicide. Vulnerable youths are the target of the Blue Whale Challenge.

Local cost of a Big Mac decides ransom amount for Fatboy ransomware

Local cost of a Big Mac decides ransom amount for Fatboy ransomware

Fatboy is the first ransomware that charges victims based on their location and the cost of a Big Mac in their country.

NSA collected 151 million records of Americans' calls, allowed 1,934 to be 'unmasked'

NSA collected 151 million records of Americans' calls, allowed 1,934 to be 'unmasked'

The NSA collected 151 million records of Americans' calls, according to a new transparency report, and allowed 1,934 Americans to be 'unmasked' upon requests of government officials.

MIT device measures walking speed with wireless signals to detect health problems

MIT device measures walking speed with wireless signals to detect health problems

MIT researchers developed the WiGait so it measures walking speed, which can help predict potential health issues, by analyzing wireless signals. It is reportedly more accurate than a wearable such as Fitbit or GPS via a phone. The...

Fitbit: One explodes, data from another used to charge husband with wife's murder

Fitbit: One explodes, data from another used to charge husband with wife's murder

A woman claimed her Flex 2 exploded and left her with second-degree burns. Police are using data from a murdered woman's Fitbit to disprove her husband's alibi and charge him with her murder.

Researchers remotely kill the engine of a moving car by hacking vulnerable car dongle

Researchers remotely kill the engine of a moving car by hacking vulnerable car dongle

Researchers exploited vulnerabilities in Bosch Drivelog Connect to remotely kill the engine of a moving car.

DHS's ICS-CERT warns of BrickerBot: IoT malware that will brick vulnerable devices

DHS's ICS-CERT warns of BrickerBot: IoT malware that will brick vulnerable devices

ICS-CERT again warned to beware of BrickerBot, an IoT malware which will brick vulnerable devices.

1,175 hotels listed in payment card breach of Holiday Inn parent company

1,175 hotels listed in payment card breach of Holiday Inn parent company

InterContinental Hotels Group reported 1,175 IHG-branded hotels were involved in a payment card breach; the investigation is not complete, but so far 1,174 franchise hotels in the US are known to have had malware accessing payment...

Crafty Ohio inmates scavenged parts, built PCs for hacking and hid them in ceiling

Crafty Ohio inmates scavenged parts, built PCs for hacking and hid them in ceiling

Ohio prison inmates built PCs from parts, hid them in the ceiling, connected to prison's network and tried to pull off cybercrimes.

Load More