Most breaches are still caused by PEBKAC and ID10T errors like falling for phishing

Most breaches are still caused by PEBKAC and ID10T errors like falling for phishing

Open. Clickety click. Pwned. Humans are still the weak security link, falling for phishing even more often than before, which leads to breaches.

04/27/16

Dogspectus: Android ransomware silently installs, demands $200 iTunes gift card ransom

Dogspectus: Android ransomware silently installs, demands $200 iTunes gift card ransom

Dogspectus is a ransomware that silently installs on Android devices, via malvertising and a Hacking Team exploit, then demands a ransom of $200 in iTunes gift cards.

04/25/16

Algorithm predicted who will bite the dust next in Game of Thrones

Algorithm predicted who will bite the dust next in Game of Thrones

Students at the Technical University of Munich have created an algorithm which predicts the likelihood of death percentage for Game of Thrones characters. If you think computer-generated guesses will be accurate, then this article...

04/20/16

Hackers only need your phone number to eavesdrop on calls, read texts, track you

Hackers only need your phone number to eavesdrop on calls, read texts, track you

Thanks to a flaw in the cellular network SS7 protocol, an attacker just needs your phone number to listen to your calls, read your texts and track you. 60 Minutes showed how hackers only needed a congressman's phone number to record...

04/18/16

Cryptoworms: The future of ransomware hell

Cryptoworms: The future of ransomware hell

If you think ransomware is growing problem now, then the cryptoworms that are 'right around the corner' and described as the future of ransomware by researchers sound like a living hell.

04/13/16

Petya ransomware cracked: Get password to decrypt hard drive for free

Petya ransomware cracked: Get password to decrypt hard drive for free

The Petya ransomware lock screen warned that your hard drive was encrypted with a military grade encryption algorithm and the only way to unlock it was to cough up the bitcoins to purchase a decryption key. But that’s no longer true;...

04/11/16

FBI, DEA and ICE are top Cellebrite customers so far in 2016

FBI, DEA and ICE are top Cellebrite customers so far in 2016

Here's a list of the government customers of Cellebrite so far in 2016.

04/06/16

Copyright cops want ISPs to hijack pirate's browser until ransom fine is paid

Copyright cops want ISPs to hijack pirate's browser until ransom fine is paid

Rightscorp's Scalable Copyright scheme involves ISPs hijacking the browser of alleged pirates until the copyright infringement fine is paid.

04/04/16

1,418 remotely exploitable flaws found in automated medical supply system

1,418 remotely exploitable flaws found in automated medical supply system

There are over 1,400 remotely exploitable flaws in Pyxis SupplyStation systems; many of those vulnerabilities, ICS-CERT warned, "an attacker with low skill would be able to exploit." The vulnerabilities are in seven third-party...

03/30/16

VNC Roulette: Prepare to be hacked if you don't use a password for VNC

VNC Roulette: Prepare to be hacked if you don't use a password for VNC

If you don't use a password for VNC, don't be surprised if your desktop and IP show up on VNC Roulette. By choosing to use no authentication to secure your VNC connection, some people might take that as a 'please hack me' invitation.

03/28/16

FBI reportedly to use Cellebrite to crack encrypted San Bernardino iPhone

FBI reportedly to use Cellebrite to crack encrypted San Bernardino iPhone

Cellebrite, a company which could suck the data off cellphones in under two minutes several years back, is reportedly the firm helping the FBI crack the San Bernardino shooter's iPhone.

03/23/16

Flaw in iMessage encryption could be exploited to decrypt iCloud photos and videos

Flaw in iMessage encryption could be exploited to decrypt iCloud photos and videos

Researchers find flaw in Apple iMessage encryption that hackers could exploit to decrypt iCloud photos and videos.

03/21/16

NASA intends to start a 'large-scale fire' in space

NASA intends to start a 'large-scale fire' in space

NASA intends to start a 'large-scale' fire aboard the Cygnus spacecraft after it undocks from the ISS as the first of three Spacecraft Fire Experiments (Saffire).

03/16/16

What can your ISP really see and know about you?

What can your ISP really see and know about you?

The FCC wants to help you protect your privacy when it comes to your Internet service provider. Technologists who grasp both law and technology believe you might make incorrect assumptions after reading a paper about online privacy...

03/14/16

Pentagon flew drones over U.S. for domestic spying missions

Pentagon flew drones over U.S. for domestic spying missions

The Pentagon admitted to flying spy drones over the U.S. according to a report obtained via a FOIA request.

03/09/16

4 new ways to bypass passcode lock screen on iPhones, iPads running iOS 9

4 new ways to bypass passcode lock screen on iPhones, iPads running iOS 9

iPhones and iPads running iOS 9 can have the lock screen passcode bypassed thanks to exploiting multiple vulnerabilities; four different scenarios were demonstrated in a security researcher's proof-of-concept video. Apple has not...

03/07/16

Oops! Kanye West tweet reveals he might pirate software, steal music too

Oops! Kanye West tweet reveals he might pirate software, steal music too

Kanye West might want to sue The Pirate Bay, but he tweeted a pic which appears as if he intended to use a torrent to pirate music software as well as use an online service to rip music from YouTube.

03/02/16

If we create autonomous killing machines, expect shoddy code and hacking

If we create autonomous killing machines, expect shoddy code and hacking

What if humans miss one tiny error in the code of killer robots or autonomous weapons? What if enemy nations hack those killing machines? Those are but a few of the dangers highlighted in a report about the risks of creating...

02/29/16

MouseJack: 'Billions' of wireless keyboards, mice vulnerable to $15 hijack attack

MouseJack: 'Billions' of wireless keyboards, mice vulnerable to $15 hijack attack

With $15 of equipment and 15 lines of code, hackers could remotely hijack wireless mice and keyboards from a distance up to 328 feet away. Dubbed MouseJack, researchers warn there is no way to detect the attack which could ultimately...

02/24/16

Comey: FBI not trying to break encryption, set loose a master key or set precedent

Comey: FBI not trying to break encryption, set loose a master key or set precedent

In the continuing iPhone encryption drama of the FBI wanting Apple to create a backdoor, FBI chief Comey said, "We don't want to break anyone's encryption or set a master key loose on the land."

02/22/16

Load More