Mobile World Congress: Bye-bye passwords, hello to biometric authentication in a blink

Mobile World Congress: Bye-bye passwords, hello to biometric authentication in a blink

Biometric solutions at Mobile World Congress move us closer to killing off passwords. Fujitsu announced a prototype smartphone that authenticates a person via iris recognition; the new ZTE Grand S3 uses eyeprint authentication scans...

03/02/15

UK researchers shatter world record by hitting 5G speeds of 1Tb per second

UK researchers shatter world record by hitting 5G speeds of 1Tb per second

UK researchers smashed the previous 5G record and holy smokes the new one is fast! Imagine being able to download 1Tb per second on your smartphone or tablet!

02/25/15

200 virtual line jumpers exploited 'technical backdoor' to score Burning Man tickets

200 virtual line jumpers exploited 'technical backdoor' to score Burning Man tickets

Nearly 80,000 people were waiting in a virtual line queue to purchase 40,000 Burning Man 2015 tickets. About 200 techies allegedly 'exploited' a backdoor in the ticketing system to cut in front of other Burners in line and buy the...

02/23/15

Mall security guards allegedly misuse CCTV to stalk women and share 'sleaze file' photos

Mall security guards allegedly misuse CCTV to stalk women and share 'sleaze file' photos

Security guards in Australia's Westfield Sydney shopping center are accused of stalking women via the mall's CCTV before tagging, saving and sharing secret 'sleaze file' photos.

02/18/15

Climate researcher claims CIA asked about weaponized weather: What could go wrong?

Climate researcher claims CIA asked about weaponized weather: What could go wrong?

The Pentagon claimed climate change is a national security issue, but even as a panel of experts suggest real-world geoengineering tests to change the climate, a climate scientist claims the CIA asked if a country controlling the...

02/16/15

Of 10 IoT-connected home security systems tested, 100% are full of security FAIL

Of 10 IoT-connected home security systems tested, 100% are full of security FAIL

The Internet of Things space is the new Wild West and home security systems are not nearly as secure as you may think; in fact, HP researchers tested 10 of the newest home security systems and discovered IoT-connected home security...

02/11/15

ISIS is a virus that Anonymous plans to cure: Hacktivists hammer ISIS with #OpISIS

ISIS is a virus that Anonymous plans to cure: Hacktivists hammer ISIS with #OpISIS

Anonymous launched #OpISIS, waging cyberwar against ISIS propaganda-spewing social media accounts and jihadist militant recruitment sites.

02/09/15

Detecting zero-day hack in one millisecond with 'power fingerprinting'

Detecting zero-day hack in one millisecond with 'power fingerprinting'

A company claims its tech can detect a zero-day hack in one millisecond by monitoring the 'power fingerprint' of a system or device. Testing in cooperation with the Department of Energy, PFP Cybersecurity tech detected Stuxnet even...

02/04/15

Hacker hijacks wireless Foscam baby monitor, talks and freaks out nanny

Hacker hijacks wireless Foscam baby monitor, talks and freaks out nanny

This is the third time news has circulated about some jerk hijacking a wireless Foscam camera/baby monitor and made his virtual intrusion known by talking. Please change the default password!

02/02/15

Drones infected with malware can drop from the sky or be hijacked for surveillance

Drones infected with malware can drop from the sky or be hijacked for surveillance

A security engineer infected a Parrot AR Drone with Maldrone malware, which creates a persistent backdoor, so an attacker can remotely control the infected drone, cause it to drop from the sky, be hijacked for surveillance, or spread...

01/28/15

Malaysia Airlines claim DNS hijacked, site not hacked, but attackers threaten data dump

Malaysia Airlines claim DNS hijacked, site not hacked, but attackers threaten data dump

Lizard Squad and Cyber Caliphate hacker groups hijacked the DNS of Malaysia Airlines, so that visitors to the URL saw two different '404 Not Found' defacements. Yet Malaysia Airlines claimed its 'website was not hacked' and customer...

01/26/15

Obama's cybersecurity plan: Share a password, click a link, go to prison as a hacker

Obama's cybersecurity plan: Share a password, click a link, go to prison as a hacker

Under President Obama's proposed cybersecurity plans and CFAA amendments, you could be considered a hacker for innocent behavior like sharing your Netflix password with family members or clicking a link that contains unauthorized...

01/21/15

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets

NSA secretly uses scapegoats, data mules and innocent victims' PCs for botnets

Leaked documents indicate that the NSA was in North Korean systems but didn't warn Sony about the attack, covertly uses innocent victims’ infected PCs when hijacking botnets, as well as secretly redirecting blame to scapegoats and...

01/19/15

75% of writers in free countries self-censor due to fears of mass surveillance

75% of writers in free countries self-censor due to fears of mass surveillance

There’s a worldwide war on free speech. Despite 1.5 million who marched under the banner of free expression in France, 54 people have been arrested for online comments. The UK wants encryption outlawed and backdoors in apps to be...

01/14/15

DOJ report sheds light on FBI’s role in overseeing NSA's PRISM surveillance

DOJ report sheds light on FBI’s role in overseeing NSA's PRISM surveillance

A declassified Justice Department report shows that the FBI conducts oversight on the NSA's PRISM email surveillance program. Since 2009, the FBI has been 'retaining copies of unprocessed communication gathered without a warrant to...

01/12/15

CES: FTC chairwoman warns how IoT device data can secretly be used against you

CES: FTC chairwoman warns how IoT device data can secretly be used against you

Will 2015 be the year when smart home hacking is a real threat? At CES 2015, the FTC chairwoman mentioned the security warning during her speech; she suggested IoT risks to privacy such as smart TV viewing habits and other data from...

01/07/15

Vulcan mind-meld, Vulcan death grip & turtle-power used in NSA's VPN crypto cracking

Vulcan mind-meld, Vulcan death grip & turtle-power used in NSA's VPN crypto cracking

What do Vulcan mind-meld, Vulcan death grip, turtle-power, flying pig, and poison nut all have in common? They are names found in the NSA's VPN Exploitation Team documentation that describe cracking the encryption used in virtual...

01/05/15

Are you using the most secure and private web browser?

Are you using the most secure and private web browser?

Aviator web browser, created by a WhiteHat Security, is setup to maximize privacy and security safeguards by default. Simply download OS X or Windows versions and then start surfing in private, protected mode without being tracked.

12/24/14

Cyberwarfare: Digital weapons causing physical damage

Cyberwarfare: Digital weapons causing physical damage

While the attack on Sony is considered “unprecedented,” it was not the worst corporate hack in 2014. More records were stolen from JPMorgan, Home Depot and even eBay. But details of two of the scariest cyberattacks just hit the news...

12/22/14

Snopes debunks Elf on the Shelf as NSA spy; Professor: Elf teaches kids spying is OK

Snopes debunks Elf on the Shelf as NSA spy; Professor: Elf teaches kids spying is OK

Even as Snopes debunked the claim that Elf on the Shelf is spying for the NSA, a digital technology professor claimed the elf is changing children’s expectation of privacy; it’s teaching kids that it is “cool for the NSA to watch...

12/17/14

Load More