At what point do white hat hackers cross the ethical line?
In recent months the news of Chris Roberts alleged hacking of an inflight entertainment system and possibly other parts of the Boeing 737 have sparked a wave of controversy. Public opinion was originally on Roberts’ side, but the recent publication of the FBI affidavit changed that drastically. According to the affidavit, Roberts admitted to doing […] more…Planned Maintenance Paterno/Pattee Wireless Aggregate
On Thursday August 13 during the maintenance window (5:00 a.m – 7:00 a.m.), ITS will be making configuration changes and hardware changes to the Pattee hub site wireless architecture. During the maintenance window, wireless service will be disrupted in the following buildings: Cedar Building Chambers Building Eisenhower Chapel Executive Ed Ford Keller Forum Kern Mateer […] more…BlackBerry denies its OS was to blame in Jeep Cherokee hack
Responding to an accusatory blog post, BlackBerry has again denied that its embedded operating system caused the potentially dangerous vulnerability recently demonstrated in Chrysler Jeep Cherokees. Last month, security researchers demonstrated how to circumnavigate the in-vehicle entertainment system of the Jeep Cherokee to take over the car itself, including control of the dashboard, steering mechanism, […] more…Maker of hacked radio says system is unique to Fiat Chrysler
The company that makes car radios that friendly hackers exploited to take control of a Jeep Cherokee says its other infotainment systems don’t have the same security flaw. Harman International CEO Dinesh Paliwal said Tuesday that the hackers used a cellular connection to get to the radio, which they used to control critical functions such […] more…Shoring up Tor: Researchers mount successful attacks against popular anonymity network — and show how to prevent them
With 2.5 million daily users, the Tor network is the world’s most popular system for protecting Internet users’ anonymity. Researchers have now demonstrated a vulnerability in Tor’s design. They show that an adversary could infer a hidden server’s location, or the source of the information reaching a given Tor user, by analyzing the traffic patterns […] more…Chrysler Recalls 1.4 Million Vehicles After Jeep Hacking Demo
Today, Fiat Chrysler recalled 1.4 million vehicles possibly affected by a vulnerability in the UConnect infotainment system that could allow attackers to hijack the vehicle’s steering and braking. Car hacking researchers Chris Valasek and Charlie Miller demonstrated proof of concept in striking fashion, when they wirelessly took control of a 2014 Jeep Cherokee driven by […] more…Security threats and why you never want to name anything
There is a bit of a name fight going on with a new class of security software. Traditionally, this has been called UBA, for User Based Analysis or Analytics. However, recently newer firms are coming to market arguing that the name should have more to do with the benefit the technology provides and reflect that […] more…The Upload: Your tech news briefing for Wednesday, June 24
Ford drives into car-sharing space As car-sharing and ride-hailing apps make it ever easier for people, especially the urban young, to shrug off the expense of actually owning a car, at least one automaker wants to get in the driver’s seat and steer the trend in a more favorable direction. Ford is launching a pilot […] more…Your brain’s unique response to words can reveal your identity
Watch your language. Words mean different things to different people – so the brainwaves they provoke could be a way to identify you. Blair Armstrong of the Basque Center on Cognition, Brain, and Language in Spain and his team recorded the brain signals of 45 volunteers as they read a list of 75 acronyms – […] more…Should hackers be tolerated to test public systems?
The purported veering of a jetliner caused by an onboard hacker points to a larger problem, experts say – airlines and other providers of services may be blind to the value such security researchers can offer in the name of public safety. While it’s far from clear that security researcher Chris Brown actually did commandeer […] more…Security pros name their must-have tools
Secure file sharing is imperative for Lawyers Without Borders, a group that works with volunteer lawyers to advance human rights law in conflict-ridden regions. The nonprofit organization, headquartered in Hartford, Conn., uses Intralinks VIA to protect confidential legal documents and court papers from unsanctioned access. The SaaS solution for content sharing and collaboration is a […] more…Sophos takes rare step of citing Microsoft flaw as a must-fix
Sophos generally steers clear of pointing to a single patch from Microsoft’s Patch Tuesday, but is breaking its own rule this month by highlighting one it says can prevent a world of hurt. The patch – MS15-034 – addresses a bug that could allow remote-code execution on a victim machine, and that can be exploited […] more…Crypto-Ransomware Sightings and Trends for 1Q 2015
It seems that cybercriminals have yet to tire of creating crypto-ransomware malware. Since the start of 2015, we have spotted several variants of crypto-ransomware plague the threat landscape. In January, the Australia-New Zealand region was beset by variants of TorrentLocker. But we soon discovered that TorrentLocker infections were not limited to that region; Turkey, Italy, […] more…Multiplatform Boleto Fraud Hits Users in Brazil
A study conducted around June last year revealed a malware-based fraud ring that infiltrated one of Brazil’s most popular payment methods – the Boleto Bancário, or simply the boleto. While the research and analysis was already published by RSA, we’ve recently discovered that this highly profitable fraud is still out in the wild and remains […] more…Are metaverse pioneers making the same old security mistakes?
Ask security pros what they would change about the Internet if they could go back in time knowing what they know now, and most can point to a list of mistakes we could have avoided. But according to some experts, we’re still making the same mistakes today, with the development of the 3D virtual reality […] more…The four main roadblocks holding up self-driving cars
SOME day soon, driverless podcars will cluster around our cities, waiting to pick us up on demand. There will be no steering wheel, no brake pedal; once seated, you can take a nap or watch a movie. This public facility will reduce traffic and carbon emissions. Not having to own a car will make transport […] more…More information
- Steve Ballmer writes his final shareholder letter as CEO of Microsoft
- Health Care Patient, Donor Data May Have Been Breached
- Apple pulls iOS 12 beta 7 OTA update amid performance woes
- Microsoft is at it again — launches new Scroogled video
- Watch on Demand: Cloud & Data Security Summit – Tackling Exposed Attack Surfaces in the Cloud
- Adobe hack shows subscription software vendors lucrative targets
- Is performance tracking about to go mobile?
- Researchers Dissect Potent "Locky Bart" Ransomware
- ‘LeakedIn’ web app checks for compromised LinkedIn passwords
- Code.org Flaw Exposes Volunteer Email Addresses