Darlene Storm

Darlene Storm (not her real name) is a freelance writer with a background in information technology and information security. It seems wise to keep an eye on new hacks and holes, to know what is possible and how vulnerable you might be. Most security news is about insecurity, hacking, cybersecurity and even privacy threats, bordering on scary. But when security is done right, it's a beautiful thing...sexy even. Security is sexy.

Researchers create app to stop RIG attacks on Android and Android-based IoT devices

Building code blueprint released to help build secure medical device software

Building code blueprint released to help build secure medical device software

Today the IEEE Cybersecurity Initiative released “Building Code for Medical Device Software Security” to help establish secure code development for software that runs in a wide range of medical devices.

Can you hear us now? Verizon and Sprint ordered to issue refunds for cramming charges

Can you hear us now? Verizon and Sprint ordered to issue refunds for cramming charges

Here's how current and former Verizon Wireless and Sprint customers who were billed for bogus or unauthorized third-party text messaging services can apply for mobile 'cramming' refunds. The wireless carriers are to pay $158 million...

More Lenovo woes: 3 security flaws, website clerical errors, maybe layoffs

More Lenovo woes: 3 security flaws, website clerical errors, maybe layoffs

Lenovo is again in the news thanks to the security snafus of three security holes in Lenovo System Update service. The company claims there is no defect in its new LaVie Z 360 devices, but blamed confusion about its capabilities on...

Android cellular voice channel used as new covert channel to leak info, spread malware

Android cellular voice channel used as new covert channel to leak info, spread malware

Researchers bypass Android security mechanisms and exploit smartphone cellular voice channel to act as a new covert channel which can potentially be used to leak information and to spread malware.

Will the next big thing come from startups competing at Disrupt NY?

Will the next big thing come from startups competing at Disrupt NY?

TechCrunch's Startup Battlefield lists startups competing for $50,000 and the Disrupt Cup. Some companies listed on Startup Alley for day one include one that says it can 'download power from the air' to power your phone, several...

What third-party app crashed American Airlines pilots' iPads and caused flight delays?

What third-party app crashed American Airlines pilots' iPads and caused flight delays?

About two dozen American Airlines flights were delayed after a faulty third-party app glitched out and crashed pilots' iPads. But what app caused it and why? Could a compatibility issue with iOS 8.3 and a navigation app crash an iPad?...

Researchers hijack teleoperated surgical robot: Remote surgery hacking threats

Researchers hijack teleoperated surgical robot: Remote surgery hacking threats

Security researchers launched cyberattacks against a teleoperated surgical robot; they easily hijacked the Raven II robot during surgery and launched a denial-of-service attack that stopped the robot and made it impossible for a...

2 more wireless baby monitors hacked: Hackers remotely spied on babies and parents

2 more wireless baby monitors hacked: Hackers remotely spied on babies and parents

Two more wireless baby monitors were hacked. One Washington family heard voices as the camera followed them about the room; the second Kansas mom was freaked out and scared as a hacker remotely controlled the camera to follow her...

Cook County subpoenas Romanian security firm, a Tor exit node operator, for 'real' IP

Cook County subpoenas Romanian security firm, a Tor exit node operator, for 'real' IP

Alistar Security, a Romanian security firm which runs Tor exit nodes, received a subpoena from Cook County (Chicago) asking for the "real" IP address that used an exit node IP address to access a Cook County IP.

90% of security incidents trace back to PEBKAC and ID10T errors

90% of security incidents trace back to PEBKAC and ID10T errors

90% of security incidents are still caused by PEBKAC and ID10T errors, according to Verizon's 2015 Data Breach Investigations Report. Phishing attacks are a prime example of how the problem exists between keyboard and user as it takes...

8th grader charged with felony hacking for changing teacher's digital wallpaper

8th grader charged with felony hacking for changing teacher's digital wallpaper

A Florida middle school student pulled a 'teenage prank' on his teacher, changing the school PC desktop background image, but he now faces felony hacking charges. The "epic" hack involved logging in to an administrative account with...

Load More
+