Post Thumbnail

The National Security Agency isn't just yearning for quantum computers that can break tough encryption -- it wants encryption that can protect against quantum computers, too. Officials have begun planning a transition to "quantum resistant" encryption that can't be cracked as quickly as conventio...

10 hours ago 0 Comments
Post Thumbnail

Most infosec pros agree that few Hollywood films or TV shows have gotten hacking as "right" as USA's Mr. Robot. The show's creator, Sam Esmail, told Engadget, "The hacker side of it actually was a combination of my frustration with the way hacker culture and tech culture was represented in Hollywo...

August 29th 2015 at 2:00pm 0 Comments
Post Thumbnail

Security researchers Charlie Miller and Chris Valasek have made a habit of getting the attention of the automotive world with their vehicle hacks. This year, the team showed an exploit that would allow hackers to remotely hijack a Jeep. That hack resulted in Fiat Chrysler recalling 1.4 million veh...

August 28th 2015 at 6:16pm 0 Comments
Post Thumbnail

Last week, the internet was awash with journalists' interpretations of Spotify's new privacy policy. Depending on whom you ask, the policy was eerie, creepy or just downright atrocious. While Spotify scrambled to reassure us that it wasn't really interested in snooping through your photos or track...

August 28th 2015 at 10:00am 0 Comments
Post Thumbnail

Windows 10's facial recognition is supposed to make it easy to sign into your PC while maintaining security, but just how good is it? Good enough that even your doppelganger might not get in, apparently. The Australian has conducted an informal test where it tried to fool Windows using sets of ide...

August 23rd 2015 at 3:40pm 0 Comments
Post Thumbnail

Know how a lot of people tend to use passwords such as "123456" or, well, "password?" Well, turns out Android lock patterns (ALPs) are just as predictable. Norwegian University of Science and Technology graduate Marte Løge analyzed 4,000 patterns for her master's thesis and found that 77 pe...

August 22nd 2015 at 11:43pm 0 Comments
Post Thumbnail

Security researchers have long warned of the dangers of using master-keyed locks -- if thieves get their hands on just one key, they compromise all of the compatible locks at the same time. And unfortunately, the US' Transportation Security Administration is learning this lesson the hard way. It...

August 22nd 2015 at 6:02pm 0 Comments
Post Thumbnail

If you just returned from an isolated island vacation (or perhaps you live under a particularly sweet and naïve rock structure), you may not have heard that notorious "dating service" Ashley Madison was hacked. The controversial site is billed as a social network and dating service for marrie...

August 19th 2015 at 6:26pm 0 Comments
Post Thumbnail

Presidential hopeful Jeb Bush says that the government should be granted broad surveillance powers over both the American people and and private technology firms so that intelligence agencies can better fight "evildoers", according to the Associated Press. No, seriously, he specifically used the t...

August 19th 2015 at 1:45pm 0 Comments
Post Thumbnail

Remember that vulnerability in the SS7 inter-carrier network that lets hackers and spies track your cellphone virtually anywhere in the world? It's worse than you might have thought. Researchers speaking to Australia's 60 Minutes have demonstrated that it's possible for anyone to intercept phone...

August 17th 2015 at 9:17pm 0 Comments
Post Thumbnail

Typically, coders and researchers who discover security vulnerabilities in software will tell the companies involved before posting their findings -- it's a courtesy to make sure that those holes are patched before attackers can use them. Don't tell that to developer Luca Todesco, though. He recen...

August 17th 2015 at 5:05pm 0 Comments
Post Thumbnail

It's the job of a security researcher to figure out how the company they are working for could be compromised. Apparently that now means using a drone sniff out vulnerabilities a few dozen feet off the ground. The Aerial Assault drone houses a raspberry Pi running Kali Linux, a distro built specif...

August 17th 2015 at 3:44pm 0 Comments