Securing the Internet of Everything
Whenever I hear about the Internet of Everything, I find myself somewhat conflicted. There’s no doubt that it is the new “mega trend” in technology, but at the same time I wonder how secure it is. Let me explain. When a company creates a smart device, they not only need to create the hardware for […] more…Spam in May 2014
Spam in the spotlight In the run-up to the summer, spammers offered their potential customers seedlings and seeds for gardening. In addition, English-language festive spam in May was dedicated to Mother’s Day – the attackers sent out adverts offering flowers and candies. Holiday spam for Mom As usual, the spammers were very busy in the […] more…VirusTotal API implementation in C programming language
Many users interact programmatically with VirusTotal via its public API, it is an easy HTTP+JSON interface that allows you to easily submit and check files in order to help improve security world-wide. Moreover, many VirusTotal Community volunteers have very kindly implemented the API in a wide variety of programming languages, some of these implementations are […] more…Wi-Fi security and fake ac/dc charges threaten your data at the 2014 World Cup
When we’re traveling we tend to bring lots of smart devices with us. It’s great to be able to share a beautiful photo, let people know where you are or put your latest news on Twitter or Facebook. It’s also a good way to find info about restaurants, hotels and transport connections. But to do […] more…Area41, formerly known as …
Gruezi from Zurich, Switzerland, where the Area41 conference is currently being held. Area41 doesn’t ring a bell? Well, this event went under a renaming process and was formerly known as Hashdays, that took place in Lucerne. However, the steering team behind it still is the DEFCON Switzland group. And they have found a fantastic venue! […] more…Failure Is the Best Thing That Could Happen to Google Glass
Today, for one day only, Google Glass goes on sale to everyone in the U.S. Everyone, that is, with an extra $1,500 to spare and a desire to become a guinea pig in a hotly contested social experiment. It’s not a stretch to say that this little test, the first that hasn’t been geared to […] more…RSA Conference 2014: The Way Forward
I attended the RSA 2014 Conference in San Francisco, which has held about two weeks ago. This year the conference offered new insights to today’s threat landscape, which will help us all plan for and protect users in 2014 and beyond. Largest Security Conference of 2014 The attendance numbers for RSA are always impressive: this […] more…TrustyCon Video
TrustyCon, the first “Trustworthy Technology Conference” was held yesterday in San Francisco. And Google/YouTube volunteered a camera crew. Nice! The full event can be viewed here: Mikko’s presentation begins at 15 minutes and 45 seconds. Other speakers: Alex Stamos, Cindy Cohn, Marcia Hofmann, Christopher Soghoian, Joseph Menn, Bruce Schneier, Garrett Robinson, Yan Zhu, Chris Palmer, […] more…The "Talking Angela" chain letter: Three tips to help you avoid Facebook hoaxes
The “Talking Angela” chain letter, which tells a scary but unsubstantiated security story about a popular game, is spreading again. Here are three tips to help you steer clear of security hoaxes on Facebook… more…The “Talking Angela” chain letter: Three tips to help you avoid Facebook hoaxes
The “Talking Angela” chain letter, which tells a scary but unsubstantiated security story about a popular game, is spreading again. Here are three tips to help you steer clear of security hoaxes on Facebook… more…Hackers to demo a $20 iPhone-sized gadget that zombifies cars
At Black Hat Asia next month, researchers plan to show a palm-sized device that costs less than $20 to build from off-the-shelf, untraceable parts and that, depending on the car model, can screw with windows, headlights and even the truly scary, make-you-crash bits: i.e., steering and brakes. more…SSCC 131 – Mac malware, Starbucks security, Apple versus FTC and giant Korean breach [PODCAST]
Chet and Duck turn a week’s worth of lost data, malware attacks, misleading apologies and shabby security into actions you can take to steer a safer course in your own organisation. Here’s our weekly “podcast with a purpose”… more…SSCC 131 – Mac malware, Starbucks security, Apple versus FTC and giant Korean breach [PODCAST]
Chet and Duck turn a week’s worth of lost data, malware attacks, misleading apologies and shabby security into actions you can take to steer a safer course in your own organisation. Here’s our weekly “podcast with a purpose”… more…Cybercrooks developing dangerous new file-encrypting ransomware, researchers warn
A team of malware developers is preparing to sell a new ransomware program that encrypts files on infected computers and asks victims for money to recover them, according to a volunteer group of security researchers who tracked the development of the threat on underground forums in recent weeks. read more more…TED Talk, in Your Language
All talks on TED.COM are translated to various languages. And all this work is done by volunteer TED Translators. My talk on NSA Surveillance has now been translated to following languages: DutchFinnishFrenchGermanGreekHebrewHungarianIndonesianItalianKoreanPersianBrazilian PortugueseRomanianSpanish In fact, there are 16 more translations underway. I’d like to thank the people who have translated and reviewed the translations of […] more…DARPA makes games of finding software vulnerabilities
The U.S. Department of Defense may have found a new way to scan millions of lines of software code for vulnerabilities, by turning the practice into a set of video games and puzzles and having volunteers do the work. Having gamers identify potentially problematic chunks of code could help lower the work load of trained […] more…More information
- Family Tech Check: 5 Ways to Help Kids Balance Tech Over Summer Break
- How to Fix Google Ads Disapproved Due to Malicious or Unwanted Software
- Catch Phish If You Can
- TIME Powers HITB Security Conference with 500Mbps Internet Speeds
- Shadow figment technology foils cyberattacks
- Inspirierende Börsenzitate und Weisheiten für Investoren
- Connected dolls and tell-tale teddy bears: Why we need to manage the Internet of Toys
- Tofsee Malware Distribution Switched From Exploit Kit to Spam
- LF Electromagnetic Radiation Used for Stealthy Data Theft From Air-Gapped Systems
- Come on Ringo! 750,000 followers deserve better… [Chet Chat Podcast 232]