Post Thumbnail

Security researchers have long warned of the dangers of using master-keyed locks -- if thieves get their hands on just one key, they compromise all of the compatible locks at the same time. And unfortunately, the US' Transportation Security Administration is learning this lesson the hard way. It...

August 22nd 2015 at 6:02pm 0 Comments
Post Thumbnail

If you just returned from an isolated island vacation (or perhaps you live under a particularly sweet and naïve rock structure), you may not have heard that notorious "dating service" Ashley Madison was hacked. The controversial site is billed as a social network and dating service for marrie...

August 19th 2015 at 6:26pm 0 Comments
Post Thumbnail

Presidential hopeful Jeb Bush says that the government should be granted broad surveillance powers over both the American people and and private technology firms so that intelligence agencies can better fight "evildoers", according to the Associated Press. No, seriously, he specifically used the t...

August 19th 2015 at 1:45pm 0 Comments
Post Thumbnail

Remember that vulnerability in the SS7 inter-carrier network that lets hackers and spies track your cellphone virtually anywhere in the world? It's worse than you might have thought. Researchers speaking to Australia's 60 Minutes have demonstrated that it's possible for anyone to intercept phone...

August 17th 2015 at 9:17pm 0 Comments
Post Thumbnail

Typically, coders and researchers who discover security vulnerabilities in software will tell the companies involved before posting their findings -- it's a courtesy to make sure that those holes are patched before attackers can use them. Don't tell that to developer Luca Todesco, though. He recen...

August 17th 2015 at 5:05pm 0 Comments
Post Thumbnail

It's the job of a security researcher to figure out how the company they are working for could be compromised. Apparently that now means using a drone sniff out vulnerabilities a few dozen feet off the ground. The Aerial Assault drone houses a raspberry Pi running Kali Linux, a distro built specif...

August 17th 2015 at 3:44pm 0 Comments
Post Thumbnail

Two-factor can keep your Gmail, iCloud and other accounts from getting hacked, but it's unfortunately rather tedious to use. That's why a team of researchers from the Swiss Federal Institute of Technology in Zurich, Switzerland has developed a tool called "Sound-Proof" to make the process less pai...

August 16th 2015 at 5:04am 0 Comments
Post Thumbnail

Reuters reports that a pair of former employees have accused Moscow-based Kaspersky Labs of building malware to trick its competition into flagging and quarantining important, non-viral, files on customers' computers. Basically the malware would inject malicious bits of code into important PC file...

August 14th 2015 at 7:20pm 0 Comments
Post Thumbnail

Having outgrown the odiferous corridors of the Rio, hacker conference Def Con entered this year by relocating to Bally's Hotel and Casino -- a venue described to me, in turns, by a Mandalay Bay hairdresser as "a shithole," a taxi driver as "a punishment" and a Mandarin Hotel bar waitress as "total...

August 14th 2015 at 5:10pm 0 Comments
Post Thumbnail

Immobilizers are supposed to kill a vehicle's engine to prevent it from being stolen. However, a trio of researchers recently released a study that reveals the Megamos immobilizer system used by more than two dozen car manufacturers -- including Volkswagen, Porsche and Honda -- can be cracked with...

August 14th 2015 at 1:44pm 0 Comments
Post Thumbnail

Last month security researcher Samy Kamkar announced a vulnerability that allowed him to remotely unlock OnStar-enabled GM cars. While that issue has been fixed, it looks like the same vulnerability found in OnStar is also present in BMW Remote, Mercedes' mbrace and Chrysler's Uconnect. Kamkar tol...

August 13th 2015 at 6:36pm 0 Comments
Post Thumbnail

In a ballroom in Bally's Vegas casino, kids are lined up on either side of a table with soldering guns melting metal to metal. Their small hands deftly join LED to circuit board, while a few feet away other children are learning the basics of developing. In the back of the room, a group of childre...

August 13th 2015 at 3:15pm 0 Comments