Report says criminals are better communicators than IT staffers
The potential of connected devices to create damage, injury and mayhem is an ongoing security concern. But so far, the Internet of Things is not being linked, in a significant way, to security problems, says a new study. Verizon, in its just-released annual report of report of cyber incidents, identifies phishing as the major problem. […] more…FBI Chief Sees Better Cyber Cooperation From China
FBI Director James Comey said Tuesday he has seen some improvement in cooperation from China in fighting cybercrime following last year’s bilateral agreement on the issue. read more more…Fraudsters Who Abused IRS "Get Transcript" Service Plead Guilty
Several people have pleaded guilty to their roles in tax fraud schemes involving the Internal Revenue Service’s “Get Transcript” database. The “Get Transcript” online service was launched in January 2014 to allow users to view and download their tax transcripts. The service was shut down in May 2015 after the IRS discovered that it had […] more…US Drops iPhone Encryption Case After Getting Passcode
The United States government has dropped a case in which it attempted to get Apple to extract information from an iPhone after receiving the passcode to the device. read more more…Computer generates all possible ideas to beat patent trolls
Alex Reben came up with 2.5 million ideas in just three days. Nearly all of them are terrible – but he doesn’t mind. He thinks he has found a way to thwart patent trolls by putting their speculative ideas in the public domain before they can make a claim. In his project, called All Prior […] more…Troj/Kovter-CF
more…Man arrested after tweeting bomb threat to Donald Trump
The “professional dumbass” allegedly tweeted “Is someone going to bomb the Trump rally or am I going to have to?” more…Stolen usernames and passwords still cause almost a quarter of all data breaches
But the same security mistakes appear to be helping hackers steal data from cloud-based systems time and time again. And it’s against that gloomy backdrop that a new report by the Cloud Security Alliance, “Identity Solutions: Security Beyond the Perimeter”, makes a worthwhile read. Tags: Security more…Rumor: ‘iPhone 7’ may feature touch-sensitive home button, full water- and dust-proofing
Apple’s next flagship iPhone will not only be waterproof and dustproof, but possibly feature a touch-sensitive home button, new rumor claims. Using a touch-sensitive button could allow the front of the so-called “iPhone 7” to sit completely flush, I4U News reported on Monday, citing Chinese-language stories from DigiTimes and Storm.mg. The device has allegedly just […] more…Review: The 2016 Retina MacBook is a faster version of the same machine
Designing a portable gadget is all about compromise. The main tension is between power and portability: how light can I make this phone without making it unacceptably slow or killing battery life, and how fast can I make this laptop without making the battery and necessary heatsinks and fans too large to comfortably carry around? […] more…No Exit: The Case for Moving Security Information Front and Center
The Open Web Application Security Project (OWASP) was founded in 2001. This non-profit organization seeks to educate and inform developers on secure development practices, and provides developers with tools to create web applications securely. read more more…Skull echoes can be a password to protect facehugger computers
Whatever’s echoing around in there is all uniquely you and could be used to authenticate users of eyewear computers. more…93 Million Mexican Voter Records Leaked Online
Authorities in Mexico have launched an investigation after a researcher discovered a publicly accessible database containing the personal details of tens of millions of Mexican registered voters. read more more…Facebook bug hunter stumbles on backdoor left by… another bug hunter
When Orange Tsai set out to participate in Facebook’s bug bounty program in February, he successfully managed to gain access to one of Facebook’s corporate servers. But once in, he realized other hackers had beaten him to it. Tsai thought he had stumbled on some malicious activity in Facebook’s network. But, according to a statement […] more…Facebook bug hunter stumbles on backdoor left by hackers
When Orange Tsai set out to participate in Facebook’s bug bounty program in February, he successfully managed to gain access to one of Facebook’s corporate servers. But once in, he realized that malicious hackers had beaten him to it. Tsai, a consultant with Taiwanese penetration testing outfit Devcore, had started by mapping Facebook’s online properties, […] more…Ransomware: A Formidable Enterprise Threat
Ransomware’s extortion-based business model, currently the latest major trend in the cybercrime industry, is marking a major change in the purpose and outcome of malware attacks and has become a major threat to consumers and enterprises alike. read more more…More information
- VMware Patches Critical Flaw in Carbon Black Cloud Workload
- Viber Hackers Deface App Store Description
- Vinyl record production gets a much-needed tech upgrade
- Malware Hijacks Social Media Accounts Via Browser Add-ons
- CryptoWall ransomware is back with new version after two months of silence
- WebMail and email.psu.edu Temporary E-mail Delivery Suspension
- Even internet security pros can be hacked
- Do not touch this one Android setting and most malware will leave you alone, mostly
- Developer faces prison time for giving blockchain talk in North Korea
- Zuck: Our Security Efforts Will Suffer if Facebook Is Broken Up