Hackers to demo a $20 iPhone-sized gadget that zombifies cars
At Black Hat Asia next month, researchers plan to show a palm-sized device that costs less than $20 to build from off-the-shelf, untraceable parts and that, depending on the car model, can screw with windows, headlights and even the truly scary, make-you-crash bits: i.e., steering and brakes. more…SSCC 131 – Mac malware, Starbucks security, Apple versus FTC and giant Korean breach [PODCAST]
Chet and Duck turn a week’s worth of lost data, malware attacks, misleading apologies and shabby security into actions you can take to steer a safer course in your own organisation. Here’s our weekly “podcast with a purpose”… more…SSCC 131 – Mac malware, Starbucks security, Apple versus FTC and giant Korean breach [PODCAST]
Chet and Duck turn a week’s worth of lost data, malware attacks, misleading apologies and shabby security into actions you can take to steer a safer course in your own organisation. Here’s our weekly “podcast with a purpose”… more…Cybercrooks developing dangerous new file-encrypting ransomware, researchers warn
A team of malware developers is preparing to sell a new ransomware program that encrypts files on infected computers and asks victims for money to recover them, according to a volunteer group of security researchers who tracked the development of the threat on underground forums in recent weeks. read more more…TED Talk, in Your Language
All talks on TED.COM are translated to various languages. And all this work is done by volunteer TED Translators. My talk on NSA Surveillance has now been translated to following languages: DutchFinnishFrenchGermanGreekHebrewHungarianIndonesianItalianKoreanPersianBrazilian PortugueseRomanianSpanish In fact, there are 16 more translations underway. I’d like to thank the people who have translated and reviewed the translations of […] more…DARPA makes games of finding software vulnerabilities
The U.S. Department of Defense may have found a new way to scan millions of lines of software code for vulnerabilities, by turning the practice into a set of video games and puzzles and having volunteers do the work. Having gamers identify potentially problematic chunks of code could help lower the work load of trained […] more…DARPA makes finding software vulnerabilities fun
The U.S. Defense Department may have found a new way to scan millions of lines of software code for vulnerabilities, namely by turning the practice into a set of video games and puzzles and have volunteers do the work. read more more…Skillport Online Learning Platform Upgrade
On Thursday, November 28, Skillsoft will be upgrading the Skillport online learning platform to version 7.3. The Skillport websites (psuohrlearning.skillport.com and psuohrvolunteer.skillport.com) will be unavailable for most of the day. The sites should return to fully operational status on Friday, November 29. If you have any questions about the upgrade, please contact the Center for […] more…Resolved: Resolved: Wireless Network Service Disruption: Multiple Buildings at University Park
This morning, between 6:30 AM and 7:45 AM, wireless network service was disrupted at the buildings below. ITS was able to restore services and they are currently operating normally. Arts Burrowes Cedar Chambers Eisenhower Chapel Executive Education Ford Forum Hamilton Hall Irvin Hall Jordan Hall Keller Kern Mateer McKee Hall Music Building II Nittany Landscape […] more…PlayStation 4 and Xbox One Survey Scams Spotted
With the recent release of the PlayStation 4 in North America and the upcoming release of the Xbox One, November is fast becoming an exciting month for gamers. However, it appears that they aren’t the only ones looking forward to these launches. We spotted several survey scams that took advantage of the buzz surrounding the […] more…SINOWAL Attempts To Disable Rapport, Aid ZBOT
The year might be coming to a close but we’re still seeing our 2013 predictions come true. We encountered an attack that featured an old malware with new routines. This malware, detected as BKDR_SINOWAL.COP specifically attempts to disable the Rapport software from Trusteer. Figure 1. Code that looks for the Trusteer Rapport module Rapport is software […] more…NSA spying prompts open TrueCrypt encryption software audit to go viral
A unique effort to crowdsource a security audit of the popular TrueCrypt open source encryption software appears to be going viral three weeks after it was launched by two U.S. based researchers in response to concerns that the National Security Agency may have tampered with it. The intiative has so far garnered more than $57,000 […] more…DeepWeb and Cybercrime – it is not just the Silk Road
The infamous Silk Road marketplace is probably the most well-known place online for anyone wanting to purchase all sorts of illegal goods – ranging from illicit drugs, to firearms and all the way up to hitmen-for-hire. Yesterday, after two and half years in operation, the site was shut down by the FBI and its owner […] more…Deep Web and Cybercrime – It Is Not Just the Silk Road
The infamous Silk Road marketplace is probably the most well-known place online for anyone wanting to purchase all sorts of illegal goods – ranging from illicit drugs, to firearms and all the way up to hitmen-for-hire. Yesterday, after two and half years in operation, the site was shut down by the FBI and its owner […] more…Court: Being ‘Electronically Present’ Can Make You Liable
A recent ruling by the New Jersey Court of Appeals has sparked a nationwide debate over exactly who is liable when an accident is caused by a distracted driver. According national reports, the court considered the claim of two victims who both lost their legs when a texting teen driver ran into their motorcycle. While […] more…How Safe is Your Android Pin Code? A New Robot Can Easily Break In
By now, many smartphone users know that a first step to securing their mobile data is to lock their phones with some sort of passcode, the most common method being the four-digit PIN. Admittedly, a PIN code seems pretty safe and practically impossible for a human to break—considering the time it would take to manually […] more…More information
- 5 keys to hiring security talent
- Apple proposes simple security upgrade for SMS 2FA codes
- Asteroid orbiting the wrong way outed as an ‘alien’
- Tips for Choosing the Right Moving Company
- Who is attacking me?
- Operating in the Shadows: US Cyber Command
- Microsoft Office CVE-2016-0054 Memory Corruption Vulnerability
- Magento Patches Critical Vulnerability in eCommerce Platforms
- 7 cybersecurity best practices that regulated industries deal with
- European Commission “doesn’t plan to comply with GDPR” – well, sort of