Did you know Google's self-driving cars can't handle 99% of roads in the US?
Opinion

Did you know Google's self-driving cars can't handle 99% of roads in the US?

While there is a lot to be excited about when it comes to driverless cars, Google's self-driving cars can't handle heavy rain, snow, unmapped traffic lights or stop signs. In other words, it is incapable of driving in nearly 99% of...

08/28/14

Feds issue bulletin warning about malicious 'Google dorking' cyber actors
Opinion

Feds issue bulletin warning about malicious 'Google dorking' cyber actors

While it seems years too late, DHS, FBI and NCTC issued a bulletin warning website admins about malicious cyber actors using Google dorking advanced search techniques to find sensitive info and vulnerabilities that can be exploited...

08/26/14

Opinion

New attacks secretly use smartphone cameras, speakers and microphones

Do you regard your smartphone cameras and speakers as a security threat? You might after checking out presentations from the 8th USENIX Workshop on Offensive Technologies (WOOT). If you were a target, you would neither see, nor...

08/20/14

Cracking smart house devices & pwning thousands of PCs via VNC remote access
Opinion

Cracking smart house devices & pwning thousands of PCs via VNC remote access

Pen testers cracked the security of every IoT device within a smart house. Other researchers scanned the Internet and grabbed 30,000 screenshots in an hour of PCs running VNC without a password. Moral of the story? Change default...

08/18/14

Opinion

Your PC or laptop may have a backdoor enabled by default, millions do

Computrace software, which is enabled by default on millions of PCs, could allow attacker to remotely wipe the hard drive. Researchers described the "backdoor" in BIOS/UEFI, as well as how it can be exploited at Black Hat USA....

08/13/14

Opinion

Black Hat: Nest thermostat turned into a smart spy in 15 seconds

No, the Nest thermostat can't be remotely hacked. But you might think twice about buying one from somewhere other than Nest since a persistent backdoor can be added in about 15 seconds...a backdoor that you would have no way of...

08/11/14

Opinion

Black Hat talk exposes how easily criminals can hack mobile broadband modems

A Black Hat USA talk exposed how easily criminals can exploit vulnerabilities and built-in functionalities in mobile broadband modems. An attacker can remotely control a target’s Internet traffic, use the built-in SMS functionality to...

08/07/14

Opinion

Researchers find about 25 security vulnerabilities per Internet of Things device

70% of the 10 most popular types of Internet of Things “smart” devices are vulnerable to being hacked, with multiple attack vectors averaging out to about 25 security vulnerabilities per IoT device....

08/04/14

Opinion

Your Android has a Fake ID problem, allowing malware to impersonate trusted apps

Security researchers have identified a critical vulnerability in all versions of Android devices, from 2.1 to 4.4, that deals with how apps are signed. Bluebox Security dubbed the flaw Fake ID; in the same way an underage person...

07/30/14

Opinion

New DVD-quality Expendables 3 film leaked online, ranked as #1 most-pirated movie

The Expendables 3 appeared online, but it’s not a shaky cam version because the movie is not slated to hit theaters until August 15. Instead the film is a high-quality version apparently ripped from a screening DVD. Over 100,000...

07/28/14

Opinion

Zero-day broker exploits vulnerability in I2P to de-anonymize Tails users

The one-two punch to privacy and security this week may push home the facts that even when using services that purportedly protect privacy, we are not as anonymous as we may like to think we are. Researchers at Exodus Intelligence,...

07/24/14

Opinion

Backup your data now: New, more powerful ransomware using Tor spotted in the wild

When did you last backup your data? Let that serve as a reminder to do so since a new ransomware, touted as a more powerful version of Cryptolocker, has been spotted in the wild. It uses the Tor network to anonymize its...

07/21/14

Opinion

Leaked GCHQ catalog of exploit tools for manipulation and mass surveillance

Just as civil liberties groups challenge the legality of the UK intelligence agency’s mass surveillance programs, a catalog of exploit tools for monitoring and manipulation is leaked online. The Joint Threat Research Intelligence...

07/16/14

Opinion

Cyber espionage: Small biofuel firm allegedly attacked 39 million times in 4 months

Chinese hackers allegedly broke into U.S. government computer networks in March and “gained access to some of the databases of the Office of Personnel Management” that hold personal information about tens of thousands of federal...

07/14/14

Opinion

Think you deleted your dirty little secrets? Before you sell your Android smartphone...

Most folks know enough to factory reset their Android phone before selling it, but few probably realize their dirty little secrets and naked selfies may still be lurking there. Avast purchased 20 previously-owned Android...

07/09/14

Opinion

If you care about online privacy, then the NSA cares about targeting you

If you care about online privacy, then the NSA cares about you…about spying on you. At least that is the gist of a story that privacy experts believe originated from a second NSA leaker. You may not have the required "balls of...

07/07/14

Opinion

Safety and security-flavored 'If This Then That' recipes

If you have some time to kill, then you might want to play around with IFTTT.com recipes. IFTTT is a service that connects two apps together via the power of the Internet. It's a way to control your personal Internet of Things. “If...

07/02/14

Opinion

Ex-NSA chief: The sky is falling! New NSA chief: The sky is NOT falling

Since the NSA released its first transparency report (pdf) last week, admitting to affecting 89,138 targets’ communications under the controversial Section 702 of the USA Freedom Act, there’s been a lot of speculation as to whether...

06/30/14

Opinion

Have cops or feds secretly hijacked your iPhone or Android with 'legal' spyware?

After capturing secret remote control “implants” in the wild – the Italian Hacking Team’s Trojans that target and infect smartphones for maximum surveillance – Kaspersky Lab and Citizen Lab gave detailed reports on the “legal”...

06/25/14

Opinion

Can sharing your open Wi-Fi network with strangers promote privacy and security?

Do you leave your wireless network open or is it secured such as with WPA2? According to the Open Wireless Movement, running an open network is not a security risk. For folks who don’t buy into that, the Open Wireless project will...

06/23/14

Load More