Post Thumbnail

The ease with which hackers seem able to access password secured computer systems including airlines, major corporations -- even the White House -- it's little wonder that the security community is scrambling for alternatives. But even biometric locks that scan our irises, faces, and fingerprints...

July 9th 2015 at 8:00am 0 Comments
Post Thumbnail

You'll frequently hear law enforcement complain that it can't break the full-drive encryption in newer smartphone operating systems, but how often do the police run into that problem, really? Thanks to a US Senate Judiciary Committee hearing, you now have a better idea. The Manhattan District Atto...

July 8th 2015 at 6:07pm 0 Comments
Post Thumbnail

If you were hoping that all of the Lizard Squad attackers who took down the PlayStation Network and Xbox Live last holiday would get their comeuppance... well, you'll be disappointed. A Finnish court has convicted Julius Kivimäki (aka "Ryan" and "Zeekill") of a whopping 50,700 charges relate...

July 7th 2015 at 7:37pm 0 Comments
Post Thumbnail

We hope you like your cognac "connected". Remy Martin's wants to give its drinkers with "rewards beyond only its dense rich flavors." That apparently corresponds to an NFC tag built into each bottle to ensure it's authenticity, freshness.. and that it hasn't been swapped out for some other brandy...

July 2nd 2015 at 11:47am 0 Comments
Post Thumbnail

The days of waiting anxiously for bug fixes (assuming they come at all) might soon be over. MIT developers have built a system, CodePhage, that automatically patches flaws by borrowing features from other apps. The tool scans apps to see how they perform security checks, and imports any superior t...

June 30th 2015 at 9:03pm 0 Comments
Post Thumbnail

VPNs (virtual private networks) are a popular choice for sidestepping censorship and geographic restrictions on services like Netflix with more than 20 percent of Europeans using them. However, researchers at the Queen Mary, University of London recently examined 14 of the region's most popular VP...

June 30th 2015 at 6:43pm 0 Comments
Post Thumbnail

When you think of internet security from Cisco, you probably imagine firewalls and routers (usually) stopping hackers and malware from hitting your network. You're going to have to expand that definition very shortly, though. Cisco has snapped up OpenDNS, whose domain name services you might hav...

June 30th 2015 at 3:39pm 0 Comments
Post Thumbnail

One of Google's most well-regarded security researchers is leaving the company, reportedly to help the government beef up its cybersecuity. Re/code is reporting that Peiter "Mudge" Zatko will be building a new agency that examines electronic threats in a similar manner as the famous Underwriters L...

June 30th 2015 at 12:45pm 0 Comments
Post Thumbnail

The Office of Personnel Management has decided to suspend its web-based background checks for the time being. In particular, it has pulled down the Electronic Questionnaires for Investigations Processing system (e-QIP) "for an extended period of time." According to a notice posted on its website,...

June 30th 2015 at 9:20am 0 Comments
Post Thumbnail

Passwords are, by many accounts, quickly going the way of the dodo. And while many sites now allow users to log in via social media, they're not always a viable option. That's why (as an alternative to logging in via Facebook or Twitter) blog-publishing platform Medium is trying a different tactic...

June 29th 2015 at 9:34pm 0 Comments
Post Thumbnail

The US' National Institute of Standards and Technology is more than a little worried that its encryption guideilnes have been creating back doors for spies, and it's changing its tune in order to plug those security holes. The agency is no longer recommending an NSA-backed number randomization t...

June 27th 2015 at 11:15pm 0 Comments
Post Thumbnail

The Securities and Exchange Commission doesn't usually investigate cyberattacks, but it's making an exception this time to hunt for a group of hackers known as FIN4. The group reportedly breaks into companies' email accounts to find corporate secrets and info, such as mergers, that can be used to...

June 24th 2015 at 8:37am 0 Comments