Verizon bans domestic surveillance and net neutrality articles from tech news site

Verizon bans domestic surveillance and net neutrality articles from tech news site

Know where you won't hear about Verizon injecting a privacy-decimating 'perma-cookie' in consumers' HTTP connections so advertisers can track Verizon customers across the web? SugarString, Verizon's tech news site, where writers are...

10/29/14

Zero-day in Samsung ‘Find My Mobile’ service allows attacker to remotely lock phone

Zero-day in Samsung ‘Find My Mobile’ service allows attacker to remotely lock phone

NIST warned that if an attacker exploits the zero-day vulnerability in Samsung's ‘Find My Mobile’ service, then the hacker can remotely lock, unlock and ring the phone.

10/27/14

DHS investigates 24 potentially deadly cyber flaws in medical devices

DHS investigates 24 potentially deadly cyber flaws in medical devices

DHS is investigating 24 potentially deadly cybersecurity flaws in medical devices like infusion pumps, implantable heart devices, medical imaging equipment and hospital networking systems.

10/22/14

Chinese Big Brother launches nationwide attack on iCloud

Chinese Big Brother launches nationwide attack on iCloud

Since the iPhone 6 launched in China, Chinese authorities have been staging a man-in-the-middle attack, via a self-signed digital certificate, so when Chinese users connect to iCloud.com, they are instead redirected to a spoofed...

10/20/14

Got a Mac? Prevent OPSEC leakage by cleaning hidden OS X files from USB drives

Got a Mac? Prevent OPSEC leakage by cleaning hidden OS X files from USB drives

If you plug a USB drive into OS X and use the Finder app to browse and change sort order, then you may have an OPSEC problem. Apple knows about the issue, and came up with a work around starting with OS X Tiger; but while Apple...

10/16/14

Researcher blames vulnerable code re-use for zero-day in Android's CyanogenMod

Researcher blames vulnerable code re-use for zero-day in Android's CyanogenMod

At the Ruxcon Security Conference, a researcher claimed Android's CyanogenMod developers failed to respond to ‘responsible disclosure’ about re-used vulnerable code that puts millions of users at risk of man-in-the-middle attacks.

10/13/14

Sock puppets post nude photos of Jennifer Lawrence on Wikipedia

Sock puppets post nude photos of Jennifer Lawrence on Wikipedia

Sock puppets posted nude photos of Jennifer Lawrence on her Wikipedia page after the actress called stolen sexting photos 'a sex crime.'

10/08/14

Angry Birds Transformers Trojan targets Android, warns ‘Obey or be hacked’

Angry Birds Transformers Trojan targets Android, warns ‘Obey or be hacked’

The new Angry Birds Transformers game officially launches this month, but it's already been targeted by a Trojan spotted in the wild that wipes the memory card, blocks messenger apps, and spams contacts every five seconds with the...

10/06/14

Encryption IS for the children; it's the gift of electronic privacy rights

Encryption IS for the children; it's the gift of electronic privacy rights

Law enforcement is freaking out over Apple and Android smartphone encryption plans, claiming it could be used by sickos harming kids and hinder investigations, but why can’t the encryption argument be made for the children and the...

10/01/14

Report: Crime-as-a-Service tools and anonymization help any idiot be a cyber-criminal

Report: Crime-as-a-Service tools and anonymization help any idiot be a cyber-criminal

Crime-as-a-Service tools, anonymization, darknets and crypto-currencies cited as in Internet Organized Crime Threat Assessment report as helping anyone become a cybercriminal.

09/29/14

Was Facebook & OKCupid’s research treating users like guinea pigs illegal?

Was Facebook & OKCupid’s research treating users like guinea pigs illegal?

Is it illegal to be guinea pigs for online research without our consent? A Maryland law professor says Facebook and OKCupid's psychological experiments were unethical and also illegal.

09/24/14

Research: Predicting crime with anonymized mobile data vs re-identifying users is easy

Research: Predicting crime with anonymized mobile data vs re-identifying users is easy

Researchers in one study claim that anonymized mobile data can predict crimes, but another group of researchers claim re-identifying users via location data is easy.

09/22/14

How will new device to help cops detect texting drivers know it wasn't the passenger?

How will new device to help cops detect texting drivers know it wasn't the passenger?

A new 'radar gun' type gadget is being developed to help cops catch texting drivers, but how will the device tell the difference between texting while driving, voice-to-text, automatic replies and a passenger in the car who is doing...

09/17/14

FBI hunting ISISGang hackers & gamers creating Cops episodes by swatting other gamers

FBI hunting ISISGang hackers & gamers creating Cops episodes by swatting other gamers

The FBI is allegedly hunting British hackers from the ISISGang for swatting, for using Skype to make terrorist threat “prank calls” that threatened schools with shootings and bombings. Sadly such hoax phone calls are becoming more...

09/15/14

Did the FBI violate CFAA by hacking to find Silk Road's server?

Did the FBI violate CFAA by hacking to find Silk Road's server?

Some security experts say the FBI's explanations for how it obtained the "leaked" IP address for Silk Road's misconfigured server are "impossible" and stink like the truth shouldn't. Legally, the DOJ claims the methods for finding the...

09/10/14

Healthcare.gov hacked? If only someone had warned it was hackable...Oh wait

Healthcare.gov hacked? If only someone had warned it was hackable...Oh wait

Malware was uploaded to a healthcare.gov test server that was not supposed to be connected to the Internet and was secured with the manufacturer's default password. But don't sweat it, we're told, as nothing was stolen and it only...

09/08/14

Will iCloud 'hack' help kill online security questions?

Will iCloud 'hack' help kill online security questions?

There is no such thing as a "private naked selfie" and the situation is not improved by Apple's online security questions. Kevin Rose is the latest to say it's time to kill such security questions. "If that's the best way we have of...

09/04/14

Are your calls being intercepted? 17 fake cell towers discovered in one month

Are your calls being intercepted? 17 fake cell towers discovered in one month

CryptoPhone users found 17 fake “cell towers” in a month, but don’t know who deployed them or why. Most phones don’t show any signs that they are a target of stingray surveillance, such as when users’ calls are recorded, texts spoofed...

09/02/14

Did you know Google's self-driving cars can't handle 99% of roads in the US?

Did you know Google's self-driving cars can't handle 99% of roads in the US?

While there is a lot to be excited about when it comes to driverless cars, Google's self-driving cars can't handle heavy rain, snow, unmapped traffic lights or stop signs. In other words, it is incapable of driving in nearly 99% of...

08/28/14

Feds issue bulletin warning about malicious 'Google dorking' cyber actors

Feds issue bulletin warning about malicious 'Google dorking' cyber actors

While it seems years too late, DHS, FBI and NCTC issued a bulletin warning website admins about malicious cyber actors using Google dorking advanced search techniques to find sensitive info and vulnerabilities that can be exploited...

08/26/14

Load More