badpassword

Latest

  • Illustration by D. Thomas Magee

    Status update: The rise of the social-media extortionist

    by 
    Violet Blue
    Violet Blue
    07.22.2016

    If you've read recent headlines about high-profile tech CEOs getting hacked, you probably felt a stab of dark amusement at the thought of internet fat cats finally getting a taste of what the rest of us have had to drink. A single group, called OurMine, has managed to catch Facebook's Mark Zuckerberg, Google's Sundar Pichai, Yahoo's Marissa Mayer, AOL's Steve Case and, most recently, Twitter CEO Jack Dorsey with their password pants down. And it's nothing more than a sleazy PR stunt.

  • Illustration by D. Thomas Magee

    Don't believe the 'Pokémon Go' privacy hype

    by 
    Violet Blue
    Violet Blue
    07.15.2016

    When the Pokémon Go obsession reached full saturation this week, privacy-concern whispers became full-blown hysterical shrieks when a researcher's blog post accused the game's maker of taking over its users' Google accounts. As it turned out, the app's iPhone permissions were just poorly implemented, and fixed immediately. Unfortunately that didn't stop the privacy and security hysteria machine. All week long, headlines made a mountain out of a molehill, scaring some people into uninstalling the app altogether.

  • Illustration by D. Thomas Magee

    Homeland Security's big encryption report wasn't fact-checked

    by 
    Violet Blue
    Violet Blue
    07.08.2016

    If you watch Marvel's Agents of S.H.I.E.L.D., Blacklist, or any other TV show with make-believe espionage, you probably hear the term "going dark" at least once a week. In the real world, "going dark" has become FBI shorthand for when baddies can't be spied on, or manage to vanish into thin internet, at the fault of encryption. And it's at the heart of an oft-virulent tug-of-war between entities such as the FBI, Apple, civil liberties groups, conspiracy theorists, and lawmakers.

  • Illustration by D. Thomas Magee

    Cybersecurity forecast: Heavy smug

    by 
    Violet Blue
    Violet Blue
    07.01.2016

    When you think of rockstar hackers and infosec pundits, I'm sure it's easy to imagine people who are humble, kind and patient, and never look down on anyone who would reuse a password. OK, maybe infosec types aren't known for doing benevolence all that well when they need to communicate with those not in the know about computer security. And when they do, they seem to prefer to do it from a stage and safely behind the title of "expert." Case in point: the much-ballyhooed talk being given at the Aspen Ideas Festival, where a professor at Rochester Institute of Technology, Josephine Wolff, is making a case today for punishing people when they're not good at computer security.

  • Bill Hinton Photography via Getty

    The clownish fight over who hacked the DNC

    by 
    Violet Blue
    Violet Blue
    06.24.2016

    A war of words has erupted over whether the DNC hack was an act of espionage by the Russian government, between soundbite-ready security firm CrowdStrike and a lone hacker who's unkindly claiming credit. And the conspiracy-theory fans went wild.

  • Illustration by D. Thomas Magee

    Lexus software update gives new meaning to 'car crash'

    by 
    Violet Blue
    Violet Blue
    06.17.2016

    Last year, headlines made everyone fearful of hackers taking over cars on the freeway. Turns out the real menace to owners of connected cars are the loopy manufacturers themselves. Toyota had to suck it up this week and admit to Lexus owners, who were going nuts on Facebook and Twitter on Tuesday, about why the climate control, radio, GPS, USB, Bluetooth, and other features suddenly stopped working for a range of 2014-2016 Lexus models. Or, their dashboard console would reset itself repeatedly.

  • Illustration by D. Thomas Magg

    Sophisticated hack attack? Don't believe the hype.

    by 
    Violet Blue
    Violet Blue
    06.06.2016

    You wouldn't believe how sophisticated hacking has become in the past few years. It has, in fact, gotten so mind-blowingly complex and erudite that this word, sophisticated, is now the only one human beings can really use to describe any single act of computer-security violation. Actually, no. The word, at best, has almost always been used to cover up egregious screwups of breached companies, and shoddy reporting. Or, when at a loss to understand even the most mundane of hacks. Even high-minded publications step into infosec's linguistic dung heap and track the word throughout their pieces on whatever latest rehashed cyber-bomb hysteria-of-the-week they're pushing.

  • Illustration by D. Thomas Magee

    Retailers fight to silence customer data breaches

    by 
    Violet Blue
    Violet Blue
    05.31.2016

    A consortium of retailers, including Target and Home Depot, vowed to fight a data breach notification bill. The bill, HR 2205 from Reps. Randy Neugebauer (R-Texas) and John Carney (D-Del.), would require companies to tell customers when they've been hacked and would also require the encryption of data in both storage and transit. It would hold retailers to the same data-security standards as the financial sector. The large and powerful Retail Industry Leaders Association (RILA) sent a letter on Tuesday to House leadership saying that "it makes no sense to take one industry's regulations and apply it to a large segment of the economy without understanding the consequences."

  • Illustration by D. Thomas Magee

    The TSA is failing spectacularly at cybersecurity

    by 
    Violet Blue
    Violet Blue
    05.20.2016

    Five years of Department of Homeland Security audits have revealed, to the surprise of few and the dismay of all, that the TSA is as great at cybersecurity as it is at customer service. The final report from the DHS Office of Inspector General details serious persistent problems with TSA staff's handling of IT security protocols. These issues include servers running software with known vulnerabilities, no incident report process in place, and zero physical security protecting critical IT systems from unauthorized access. What we're talking about here are the very basics of IT security, and the TSA has been failing at these quite spectacularly for some time.

  • Illustrations by D. Thomas Magee

    Where the candidates stand on cyber issues

    by 
    Violet Blue
    Violet Blue
    05.13.2016

    It's a little difficult to nail down the US presidential candidates on cybersecurity. That's probably because none of the candidates actually has a cybersecurity plan. What little the candidates have said about cybersecurity is as bizarre as the entire reality-TV election process spectacle itself. They each think cybersecurity means one, or possibly two, things. Bernie Sanders is obsessed with the NSA. Donald Trump said that Edward Snowden should be executed and wants to hack-attack China. Hillary Clinton just seems unsure about what exactly she should say.

  • Petrovich9/Getty Images

    How Armenian gangsters blew up the fingerprint-password debate

    by 
    Violet Blue
    Violet Blue
    05.06.2016

    Paytsar Bkhchadzhyan is a woman with a colorful past and a bummer of a present. She arrived this week in news stories with a string of criminal convictions and gained notoriety for pleading "no contest" to felony identity theft early this year. Her iPhone was seized from the home of her boyfriend, one Sevak Mesrobian, a member of Los Angeles-based gang Armenian Power. Her fingerprint then began its long journey to giving civil-liberties fetishists a new storyboard for their "bad touch" role-play scenes.

  • Illustration by D. Thomas Magee

    Who hacked Facebook?

    by 
    Violet Blue
    Violet Blue
    04.29.2016

    Late last week, a hacker named Orange Tsai wrote about how he hacked into Facebook under the aegis of its bug bounty program. A bug bounty is when a company pays hackers for vulnerabilities they find, providing the company with real-world threat testing outside the scope of its security team. But Tsai found much more than a bug. He discovered that another hacker had been in the company's systems for around eight months, grabbing employee usernames and passwords -- and probably more.

  • Shutterstock / Hugo Felix

    How '60 Minutes' played 'Telephone' with public-hacking hysteria

    by 
    Violet Blue
    Violet Blue
    04.22.2016

    On Sunday, 60 Minutes took a year-old segment on phone hacking it shot and aired in Australia, fluffed it up with other old hacks from last year's Def Con and repackaged it for an American audience. Almost no one noticed those particular details. But just about everyone panicked. "Hacking Your Phone" set off a scare that raged through headlines and social media all week. As the miasmic cherries on top, the episode also freaked out California Rep. Ted Lieu (D), who has called for a congressional investigation, and the FCC is now involved.

  • Illustration by D. Thomas Magee

    Senate to Americans: Your security is not our problem

    by 
    Violet Blue
    Violet Blue
    04.15.2016

    The Senate Intelligence Committee just released a draft of long-awaited legislation to tackle the problem authorities have with encrypted communications. Namely, because encryption is so secure, it interferes with court orders in the same way private property poses problems for police who just want to get things done.

  • REUTERS/Carlos Jasso

    The Panama Papers, a breach we can all get behind

    by 
    Violet Blue
    Violet Blue
    04.08.2016

    Now here's a breach and leak everyone can get behind (unless you're a billionaire despot, that is). Selected excerpts from the Panama Papers dropped on Sunday, an unprecedented snatch-and-grab of offshore tax haven records released to a handful of global news organizations. In them, the tax-avoiding dealings of the super-rich were exposed in a gigantic haul of data said to total around 11.5m files (2.6 terabytes). It was taken from shell-company specialist Mossack Fonseca by an anonymous source, who shared the Panamanian law firm's trove with German newspaper Süddeutsche Zeitung.

  • Illustration by D. Thomas Magee

    CNBC shows how not to handle a security screwup

    by 
    Violet Blue
    Violet Blue
    04.01.2016

    As articles go, Tuesday's CNBC piece trying to cobble together the Apple/FBI fight with interactive clickbait -- a little box where readers should enter their password to test its hackability -- was a stretch. Worse, the story, called "Apple and the construction of secure passwords," hinged entirely on encouraging people to do something no one should ever, ever do. Namely, enter a password anywhere except the proper login page. CNBC, it seems, was trying to teach its readers about security.

  • Illustration by D. Thomas Magee

    Advertising's hottest surveillance software is surprisingly legal

    by 
    Violet Blue
    Violet Blue
    03.25.2016

    You may have heard that the FTC this week sent out a dozen strongly worded letters to apps using the SilverPush framework. The FTC politely told 12 app developers that they needed to let users know that SilverPush was collecting data and selling it to third parties. SilverPush responded two days ago by issuing a statement claiming it no longer uses the "Unique Audio Beacons" (UAB), and has "no active partnership with any US-based developers." Well, if this is true, then perhaps SilverPush should remove UAB as a core product from its website -- and from the heart of its business model, as well.

  • Illustration by D. Thomas Magee

    America accuses Iran of hacking the dam, cyber-squirrels rejoice

    by 
    Violet Blue
    Violet Blue
    03.18.2016

    As cyber-geddon stories go, Middle Eastern countries hacking into US dams or power grids and making stuff go haywire sounds like the plot for a not-so-subtly racist Hollywood scare flick. But that's the story we got when news outlets, citing unnamed sources, recently reported the Obama administration would be calling out Iranian hackers as the culprits behind a malicious 2013 breach at a New York dam.

  • AP Photo/Marcio Jose Sanchez

    RSA security conference: 25 years of discontent and pranks

    by 
    Violet Blue
    Violet Blue
    03.09.2016

    The first time I went anywhere near the RSA information security conference in San Francisco, it was by way of a prank. Two things I love to cover are computer crime and and enterprise security, so when I met friends for drinks at a downtown hotel bar during the conference one year they were genuinely surprised I'd never attended RSA. One of my drinking pals that night was Twitter's head of security, and he jokingly asked if I wanted to go to RSA -- right now.

  • Illustration by D. Thomas Magee

    MasterCard's selfie security: What could possibly go wrong?

    by 
    Violet Blue
    Violet Blue
    02.26.2016

    When I read about MasterCard's plan to do selfie security with purchases, I wondered what the first massive breach of biometric data is going to look like. Unlike passwords, biometrics such as face mapping, fingerprints and iris scans can't be changed when a database gets popped. Worse, data sold to marketers or snarfed into an authoritarian database isn't revokable. Manny the cat would not approve. Fortunately, MasterCard isn't going to be replacing the password or pin with selfies, but instead wants to make its "Selfie Pay" app part of a two-step security routine when purchases are made or money is withdrawn. MasterCard says users will be required to blink for the app to demonstrate it's a live image. The company plans to roll it out in the U.S., Canada, the U.K. and a few European countries by this summer.