Should hackers be tolerated to test public systems?
The purported veering of a jetliner caused by an onboard hacker points to a larger problem, experts say – airlines and other providers of services may be blind to the value such security researchers can offer in the name of public safety. While it’s far from clear that security researcher Chris Brown actually did commandeer […] more…Warning to white-hat hackers: Obama proposal a threat to what you do
President Obama’s proposal to update the computer fraud and abuse act could put white-hat hackers at risk of prosecution as members of organized crime, the SchmooCon hacking conference was told. Under Obama’s proposal, simply sharing passwords with friends – something hackers do routinely – could be enough to indicate that the person doing the sharing […] more…Hacktivist Group CyberBerkut Behind Attacks on German Official Websites
A pro-Russian group called CyberBerkut claimed responsibility for a recent hack on certain German government websites in early January. We were able to gather some information on some of its members based on Pastebin data that had been leaked by the Ukrainian nationalist political party (Pravy Sektor). A Background on CyberBerkut CyberBerkut is an organized group […] more…Doing more with less: Steering a quantum path to improved internet security
New research may lead to greatly improved security of information transfer over the internet. Physicists have demonstrated the potential for ‘quantum steering’ to be used to enhance data security over long distances, discourage hackers and eavesdroppers and resolve issues of trust with communication devices. more…Cydia’s Popular BigBoss Repo Allegedly Gets Hacked
BigBoss, one of the biggest and most popular Cydia repositories, has allegedly been hacked. Attackers “Kim Jong-Cracks” claim to have gained access to all packages — including paid titles — and made them available for free via their own repo. Cydia users are advised to steer well clear of it, however. Tags: Security Industry News more…Hackers to demo a $20 iPhone-sized gadget that zombifies cars
At Black Hat Asia next month, researchers plan to show a palm-sized device that costs less than $20 to build from off-the-shelf, untraceable parts and that, depending on the car model, can screw with windows, headlights and even the truly scary, make-you-crash bits: i.e., steering and brakes. more…Researchers reveal methods behind car hack at Defcon
Two security researchers at Defcon on Friday revealed the methods they used to hack into car computers and take over the steering, acceleration, breaks and other important functions. read more more…Airport VPN hacked using Citadel malware
The pervasive Citadel trojan, typically reserved for financial theft, was used to beat two-factor authentication and hack into the virtual private network (VPN) of a major international airport, researchers revealed Tuesday. Security firm Trusteer discovered the attack, which launched a two-step assault on its victims in order to compromise the airport’s VPN. Tags: Security Viruses […] more…US Charges 8 People Over Cybercrime, Tax Fraud Scheme
The United States Department of Justice this week announced charges against eight individuals for their participation in a racketeering (RICO) conspiracy that involved hacking and tax fraud. read more more…Guide: Protecting Your Digital Identity
People in their 20s and 30s are losing it online. And by it, I mean money—thanks to digital identity theft. In its simplest form, your digital identity is made up of a whole host of things that can be traced back to you and who you are. That can range anywhere from photos you post online to online shopping accounts, email accounts to telephone numbers, […] more…See Yourself in Cyber – Five Quick Ways You Can Quickly Get Safer Online
With “See Yourself in Cyber” as the theme for this year’s Cybersecurity Awareness Month, the focus is on you with a look at several quick ways you can quickly get safer online. Now in its 21st year, Cybersecurity Awareness Month marks a long-standing collaboration between the U.S. government and private industry. It’s aim, empower people […] more…All-New Ransomware Coverage Opens Up the Path to Recovery
Our all-new ransomware coverage is now available, ready to help just in case—all backed by expert advice to help you find the quickest and best possible path to recovery. Ransomware coverage from McAfee can reimburse you up to $25,0000 for losses resulting from a ransomware threat, including financial losses and ransom fees. You’ll find this […] more…Privacy, please! Why a VPN on your smartphone may be a smart move for you.
Using a VPN on your smartphone can boost your privacy in a big way, particularly with all the data tracking that’s happening out there today. For some time now, we’ve recommended a VPN when using public Wi-Fi in airports, libraries, hotels, and coffee shops. Given that these are public networks, a determined hacker can snoop […] more…Getting Your Kids Ready for School—And Their Smartphones Too
If you’re the parent of a tween or teen, chances are they’re not the only ones going back to school. Their smartphones are going back too. Our recent global research showed just how many tweens and teens use a smartphone. Plenty. Depending on the age band, that figure ranges anywhere from 76% to 93%, with […] more…Can My Phone Be Tracked If Location Services Are Off?
Your smartphone comes with built-in location services, which are useful if you lose it or if you use an app that needs to know your location. But what if you don’t want your phone to be tracked? Can the phone be located if you turn off location services? The answer is yes, it’s possible to […] more…How to Protect Your Social Media Accounts
Social media is part of our social fabric. So much so that nearly 50% of the global population are social media users to some degree or other. With all that sharing, conversing, and information passing between family and friends, social media can be a distinct digital extension of ourselves—making it important to know how you […] more…More information
- COVID-19 Is Requiring Us to Implement Cyber Distancing (Part 2)
- Data hoarding: The consequences go far beyond compliance risk
- Like the Food in Asia, Identity Governance Isn’t Just for Compliance Anymore
- FBI warns of crimewave hitting cash registers
- Man Sentenced to 15 Years in Prison for DDoS Attacks, Firearm Charges
- Website Malware – Reality of Cross-Site Contaminations
- The future of work is here
- Massive WannaCry/Wcry Ransomware Attack Hits Various Countries
- SSCC 149 – Apple devices ransomed, eBay breached, carders busted and more [PODCAST]
- ESO Solutions Data Breach Impacts 2.7 Million Individuals