Abhinav Gupta

36 Flips | 1 Magazine | 3 Likes | 1 Following | @AG177 | Keep up with Abhinav Gupta on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Abhinav Gupta”

MYNT is a Durable Bluetooth Tracker That Doubles as Remote Control

All the components of MYNT have been packed in its stainless steel housing, which ensures the Bluetooth tracker steadily puts an eye on your …

Consumer Tech

Girls, drugs and cyber security: the strange life of John McAfee

"If you're caught eating small children and you handle it properly, a year from now people will forget the fact that you're eating small children but …

To Battle Cyber Attacks, CEOs Need To Act More Like The Military

In recent years, cyber attacks on businesses as different as entertainment group Sony, retailer Target and – most lately – the internet dating site Ashley Madison have shown that the technology that offers so many opportunities also brings with it significant threats. Yet the signs are that – for …

How much should we trust tech companies?

Last week, the internet was awash with journalists' interpretations of Spotify's new privacy policy. Depending on whom you ask, the policy was eerie, creepy or just downright atrocious. While Spotify scrambled to reassure us that it wasn't really interested in snooping through your photos or …

Spear phishers with suspected ties to Russian government spoof fake EFF domain, attack White House

The spear-phishing attempt appears to be part of "Pawn Storm," a massive attack that's been underway across the net for more than a month, and …

Russian Government

Iranian Phishing

CitizenLab is reporting on Iranian hacking attempts against activists, which include a real-time man-in-the-middle attack against Google's two-factor …

List of Penetration Testing Distrubitions for Penetration Testing and Ethical Hacking

Here is a <b>list of penetration testing distributions</b> that can be used by <b>penetration testers</b>, <b>ethical hackers</b>, and <b>computer secrurity enthusiasts.</b> A</b> …

FTC Has Authority to Enforce Corporate Cybersecurity

Up to now, there have been relatively few laws or regulations from government agencies that mandate just how companies should protect their data. In …

Some routers vulnerable to remote hacking

Several DSL routers from different manufacturers contain a guessable hard-coded password that allows the devices to be accessed with a hidden …

Information Security

Dissecting a Hacktivist Attack

Security firm Imperva had the opportunity to watch a hacktivist attack play out and work to mitigate the threat as it happened in real-time.<p>The …

Audit report finds sensitive data at risk for at least 73 Callif. agencies

Sensitive data of California residents including, social security numbers, health records, and income tax information is at risk of unauthorized use, …

Weekly Metasploit Wrapup

Time for another weekly wrapup for Metasploit! Since it's been getting some play in the news, I wanted to use this space to talk a little bit more …

Network security firewalls approach $1 billion in 2Q15 - Help Net Security

The enterprise-class network security firewall market sales climbed more than 10 percent compared to the year-ago-period and approached a $1 billion …

Network Security

Cybersecurity Under FTC Authority: What Does it Mean?

Consumers can now expect the same level of security and privacy in the digital realm as they do in the physical.

Silent Circle's latest app democratizes encryption. Governments won't be happy.

For the past few months, some of the world’s leading cryptographers have been keeping a closely guarded secret about a pioneering new invention. …

Japanese security company claims it’s discovered a new kind of train pervert: Lady sniffers

One of the most infamous aspects of Japanese society are <b>chikan</b>, the <b>men who surreptitiously grope women on crowded trains</b>. One Japanese security …

Trains

Estimote Fixes Security Problems with Beacon Firmware

At the tail end of last week, a couple of weeks after our post outlining the security vulnerabilities of the latest Estimote beacon firmware, the company contacted us to point towards the news of their latest firmware update.<p>As we’d summarised, Estimote uses a completely different beacon …

Information Security

Irony: NSA worried hackers with super computers might break current encryption standards

The National Security Agency (NSA) has a bunch of sophisticated tools at its disposal to conduct massive data collection operations all in the name …

Privacy Is Dead: What You Still Can Do to Protect Yourself

When it comes to cybersecurity, we are all in a state of emergency, but the real question is -- is anybody listening?<p>A recent poll commissioned by Intercede, a digital security company, asked more than 1,000 men and women between the ages of 16-35 (aka millennials) in the U.S. and over 1,000 in the …

Select few pose vast majority of cyber risks, security firm warns

Cloud computing has changed the way organizations operate by allowing applications and data sets to be accessed from anywhere with Internet. But …

Another nail in Adobe Flash's coffin - Chrome to block Flash ads from September 1st

Author:<p>Published<p>in Adobe, Adobe Flash, Google, Google Chrome, Malware, Vulnerability 1<p>Last month, Firefox blocked all Flash content by default - as …

Netflix Is Dumping Anti-Virus, Presages Death Of An Industry

For years, nails have been hammering down on the coffin of anti-virus. But none have really put the beast to bed. An industry founded in the 1980s, a time when John McAfee was known as a pioneer rather than a tequila-downing rascal, has survived despite the rise of umpteen firms who claim to offer …

5 things to learn from the DoD on Cyber Security

I recently just had the unique privilege of sitting in a briefing given by a senior DoD Cyber expert to a bunch of middle state CEOs about the how …

Former security intern admits developing super-stealthy Android spyware

Dendroid cost $300, made it easy to take pictures and record audio and video.<p>A former intern at security firm FireEye has admitted in federal court …

A Peek Inside Mr. Robot's Toolbox

The bar wasn’t exactly high for dystopian hacker suspense thrillers when USA Network’s <i>Mr. Robot</i> launched, but the show has gone on to surprise …

Hackers stole $1.2 billion from 7,000 businesses in 2 years

Hackers have funneled $1.2 billion out of companies' accounts since October 2013, the FBI reported.<p>Using an increasingly common scam called "business email compromise," hackers will pose as CEOs of companies and ask employees to hand over confidential financial information.<p>Typically, hackers will …