Google's Internet-connected toys patent sparks privacy concerns, visions of IoT Chucky

Google's Internet-connected toys patent sparks privacy concerns, visions of IoT Chucky

Google's recently published patent for Internet-connected toys, which have microphones, cameras, speakers and motors, have sparked privacy concerns; the 'creepy' anthropomorphic devices might look like a doll or teddy bear; but some...

05/25/15

Researchers create app to stop RIG attacks on Android and Android-based IoT devices

Researchers create app to stop RIG attacks on Android and Android-based IoT devices

Researchers, who said there is an urgent need to mitigate runtime-information-gathering (RIG) attacks on Android mobile and Android-controlled Internet of Things devices, presented 'Leave Me Alone: App-level Protection Against Runtime...

05/20/15

Building code blueprint released to help build secure medical device software

Building code blueprint released to help build secure medical device software

Today the IEEE Cybersecurity Initiative released “Building Code for Medical Device Software Security” to help establish secure code development for software that runs in a wide range of medical devices.

05/18/15

Can you hear us now? Verizon and Sprint ordered to issue refunds for cramming charges

Can you hear us now? Verizon and Sprint ordered to issue refunds for cramming charges

Here's how current and former Verizon Wireless and Sprint customers who were billed for bogus or unauthorized third-party text messaging services can apply for mobile 'cramming' refunds. The wireless carriers are to pay $158 million...

05/13/15

More Lenovo woes: 3 security flaws, website clerical errors, maybe layoffs

More Lenovo woes: 3 security flaws, website clerical errors, maybe layoffs

Lenovo is again in the news thanks to the security snafus of three security holes in Lenovo System Update service. The company claims there is no defect in its new LaVie Z 360 devices, but blamed confusion about its capabilities on...

05/11/15

Android cellular voice channel used as new covert channel to leak info, spread malware

Android cellular voice channel used as new covert channel to leak info, spread malware

Researchers bypass Android security mechanisms and exploit smartphone cellular voice channel to act as a new covert channel which can potentially be used to leak information and to spread malware.

05/06/15

Will the next big thing come from startups competing at Disrupt NY?

Will the next big thing come from startups competing at Disrupt NY?

TechCrunch's Startup Battlefield lists startups competing for $50,000 and the Disrupt Cup. Some companies listed on Startup Alley for day one include one that says it can 'download power from the air' to power your phone, several...

05/04/15

What third-party app crashed American Airlines pilots' iPads and caused flight delays?

What third-party app crashed American Airlines pilots' iPads and caused flight delays?

About two dozen American Airlines flights were delayed after a faulty third-party app glitched out and crashed pilots' iPads. But what app caused it and why? Could a compatibility issue with iOS 8.3 and a navigation app crash an iPad?...

04/29/15

Researchers hijack teleoperated surgical robot: Remote surgery hacking threats

Researchers hijack teleoperated surgical robot: Remote surgery hacking threats

Security researchers launched cyberattacks against a teleoperated surgical robot; they easily hijacked the Raven II robot during surgery and launched a denial-of-service attack that stopped the robot and made it impossible for a...

04/27/15

2 more wireless baby monitors hacked: Hackers remotely spied on babies and parents

2 more wireless baby monitors hacked: Hackers remotely spied on babies and parents

Two more wireless baby monitors were hacked. One Washington family heard voices as the camera followed them about the room; the second Kansas mom was freaked out and scared as a hacker remotely controlled the camera to follow her...

04/22/15

Cook County subpoenas Romanian security firm, a Tor exit node operator, for 'real' IP

Cook County subpoenas Romanian security firm, a Tor exit node operator, for 'real' IP

Alistar Security, a Romanian security firm which runs Tor exit nodes, received a subpoena from Cook County (Chicago) asking for the "real" IP address that used an exit node IP address to access a Cook County IP.

04/20/15

90% of security incidents trace back to PEBKAC and ID10T errors

90% of security incidents trace back to PEBKAC and ID10T errors

90% of security incidents are still caused by PEBKAC and ID10T errors, according to Verizon's 2015 Data Breach Investigations Report. Phishing attacks are a prime example of how the problem exists between keyboard and user as it takes...

04/15/15

8th grader charged with felony hacking for changing teacher's digital wallpaper

8th grader charged with felony hacking for changing teacher's digital wallpaper

A Florida middle school student pulled a 'teenage prank' on his teacher, changing the school PC desktop background image, but he now faces felony hacking charges. The "epic" hack involved logging in to an administrative account with...

04/13/15

Over 1 million WordPress sites may be affected by a flaw in WP Super Cache plugin

Over 1 million WordPress sites may be affected by a flaw in WP Super Cache plugin

Over 1 million WordPress sites may be affected by a flaw in the WP Super Cache plugin; patch now as the FBI warned ISIS sympathizers may hack WordPress sites using vulnerable plugins.

04/08/15

Eerie music coming from wireless baby cam; is it a haunting? No, it’s a hacker

Eerie music coming from wireless baby cam; is it a haunting? No, it’s a hacker

Eerie music comes from a wireless baby cam, but stops when parents enter the room. The Foscam nanny cam changes position as if on its own. Is it a haunting? No, it’s a hacker.

04/06/15

Wearing GPS ankle monitor is a search, yet apps track your location every 3 minutes

Wearing GPS ankle monitor is a search, yet apps track your location every 3 minutes

The Supreme Court says tracking a person via GPS ankle bracelet, to know the individual's location at all times, qualifies as a 'search' and could violate the Fourth Amendment. Yet Android apps track and can share your location every...

04/01/15

$60 DIY car hacking device is an inexpensive and easy way to hack cars

$60 DIY car hacking device is an inexpensive and easy way to hack cars

At the Black Hat Asia security conference, former Tesla intern and embedded systems developer Eric Evenchick released open source Python-based CANard software and CANtact hardware designs that will allow anyone to hack their connected...

03/30/15

Steve Wozniak on AI: Will we be pets or mere ants to be squashed our robot overlords?

Steve Wozniak on AI: Will we be pets or mere ants to be squashed our robot overlords?

Apple co-founder Steve Wozniak predicts a 'scary' future when artificial intelligence takes over from humans. It will be 'very bad for people,' but will we be pets to our robot overlords or mere ants to be squashed?

03/25/15

Tech-savvy NYPD cop allegedly hacked NYPD computer and FBI database to run a con

Tech-savvy NYPD cop allegedly hacked NYPD computer and FBI database to run a con

An NYPD auxiliary cop was busted for installing electronic devices in an NYPD Traffic Safety Office; one was a hidden camera in a cable TV box that he would check before using the other to remotely access a police computer and then...

03/23/15

Darknet's Evolution drug marketplace poofs along with $12 million in bitcoins

Darknet's Evolution drug marketplace poofs along with $12 million in bitcoins

Another high stakes bitcoin heist may have happened on the deep web as Evolution Market, the biggest drug marketplace on the darknet, vanished; users and vendors are out for blood, blaming the admins for stealing about $20 million in...

03/18/15

Load More