September 10, 2015
Via: Dan GoodinNow that a hobbyist team has uncovered programming errors that make more than 15 million of the Ashley Madison account passwords orders of magnitude faster to crack, it will be only a matter of time before a large percentage of […]
August 31, 2015
Via: Dan GoodinExecutives at Ashley Madison may have lost their founder and CEO after suffering a breach that leaked highly personal details for more than 30 million users, but they want to make one thing clear: business fundamentals are strong, and the […]
August 31, 2015
Via: Sean GallagherThe Washington Post’s Ellen Nakashima reports that under the direction of the Obama administration, US government officials are planning “a package of unprecedented economic sanctions against Chinese companies and individuals” who have profited from trade secrets stolen from US companies […]
August 21, 2015
Via: Dan GoodinThe National Security Agency is advising US agencies and businesses to prepare for a time in the not-too-distant future when the cryptography protecting virtually all e-mail, medical and financial records, and online transactions is rendered obsolete by quantum computing. Quantum […]
July 23, 2015
Via: Dan GoodinOne of the more recent discoveries resulting from the breach two weeks ago of malware-as-a-service provider Hacking Team is sure to interest Android enthusiasts. To wit, it’s the source code to a fully featured malware suite that had the ability […]
July 20, 2015
Via: Cyrus FarivarItalian prosecutors have begun a criminal investigation of six former employees of the embattled company Hacking Team, according to a Reuters’ report citing anonymous sources. Hacking Team was hacked two weeks ago and had its data published all over the […]
July 15, 2015
Via: Dan GoodinPrivacy advocates disappointed about the sudden and unexplained demise of the ProxyHam device for connecting to the Internet have reason to cheer up: there are two similarly low-cost boxes that do the same thing or even better. The more impressive […]
June 12, 2015
Via: Sean GallagherAs officials of the Obama administration announced that millions of sensitive records associated with current and past federal employees and contractors had been exposed by a long-running infiltration of the networks and systems of the Office of Personnel Management on […]
May 21, 2015
Via: Dan GoodinAn estimated 500 million Android phones don’t completely wipe data when their factory reset option is run, a weakness that may allow the recovery of login credentials, text messages, e-mails, and contacts, computer scientists said Thursday. In the first comprehensive […]
May 21, 2015
Via: Peter BrightAs companies continue to beat the Internet of Things drum, promoting a world when every device is smart, and anything electronic is network connected, we have some news that shows just what a horrible idea this really is. A security […]
May 20, 2015
Via: Dan GoodinTens of thousands of HTTPS-protected websites, mail servers, and other widely used Internet services are vulnerable to a new attack that lets eavesdroppers read and modify data passing through encrypted connections, a team of computer scientists has found. The vulnerability […]
May 17, 2015
Via: WIRED UKA Belgian watchdog has urged all Internet users to download privacy software specifically to shield themselves from Facebook’s grasp. The social network has been under fire for the ways in which it tracks user and non-user behaviour online, without consent, […]
May 5, 2015
Via: Dan GoodinCritical vulnerabilities in a market-leading line of digital locks securing hospitals, airports, and water treatment facilities makes it possible for rogue employees or outside attackers to clone digital keys, researchers reported late last week. Thursday’s advisory from security firm IOActive […]
May 4, 2015
Via: Dan GoodinResearchers have uncovered new malware that takes extraordinary measures to evade detection and analysis, including deleting all hard drive data and rendering a computer inoperable. Rombertik, as the malware has been dubbed by researchers from Cisco Systems’ Talos Group, is […]
May 1, 2015
Via: Dan GoodinOn Thursday, Ars reported that a new service that warns when Google account users’ passwords are phished had been bypassed by a drop-dead simple exploit, just 24 hours after Google had rolled out the Chrome plugin. Within hours of publication, […]
April 26, 2015
Via: Megan GeussOn Saturday the New York Times reported that “senior American officials briefed on the investigation” confirmed a hack of the White House’s unclassified network last year. The breach “was far more intrusive and worrisome than has been publicly acknowledged,” officials […]
April 20, 2015
Via: Dan GoodinAbout 1,500 iPhone and iPad apps contain an HTTPS-crippling vulnerability that makes it easy for attackers to intercept encrypted passwords, bank-account numbers, and other highly sensitive information, according to research released Monday. An estimated two million people have installed […]
April 16, 2015
Via: Cyrus FarivarThe Drug Enforcement Administration (DEA) and the United States Army have almost certainly been buying questionable remote access hacking tools for years from an Italian company called Hacking Team, via an obscure American reseller called Cicom USA. Hacking Team openly […]
April 15, 2015
Via: Dan GoodinVirginia election officials have decertified an electronic voting system after determining that it was possible for even unskilled people to surreptitiously hack into it and tamper with vote counts. The AVS WINVote, made by Advanced Voting Solutions, passed necessary voting […]
April 15, 2015
Via: Dan GoodinOne day a last year, an obscure cyber espionage group sent a spear phishing e-mail. It carried the usual trappings of a spear phish sent by advanced persistent threat actors. It was short, appeared to come from an address the […]