Akankshya Padhi

37 Flips | 5 Magazines | 1 Like | 2 Following | 1 Follower | @Ap260591 | Keep up with Akankshya Padhi on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Akankshya Padhi”

Google search bug floods random man's Hotmail account with 10,000 emails a day

Blank missives are arriving at a rate of roughly 500 per hour<p>Starting yesterday afternoon, the Hotmail account of California resident David Peck suddenly became a lot more popular. It's the result of a bug in Google search, which <i>The Verge</i> was able to reproduce. Search for "gmail" and the first …

The first-ever botwall could change the economics of hacking forever

For companies with data to protect, their primary problem is how cheap hacking can be.<p>While “hacking” encompasses a wide variety of activities, one company is specifically tackling the botnet problem: The ability to use a network of linked computers to overwhelm a website or break into user …

Anti-Virus Software

To keep hackers away from implanted devices, researchers use the heartbeat as a password

Advertisement<p>2 Comments<p>Credit: Shutterstock<p>Just like a phone or computer, devices implanted inside the body can be hacked; potentially with …

A Few Tricks All The New iOS 7 Users Should Know

At long last, iOS 7 has arrived. That is, it arrived for everyone who didn’t say “Developer? Oh, yeah, I’m totally a developer. Cough” and wiggle into the Beta months ago.<p>iOS 7 is a strange new land, especially on day one. Out with the gradients, in with the trippy fluorescents. Your favorite app? …

Fatal crypto flaw in some government-certified smartcards makes forgery a snap

With government certifications this broken, the NSA may not need backdoors.<p>Raising troubling questions about the reliability of government-mandated …

Hackers Courted by Government for Cyber Security Jobs - Rolling Stone

HTML5 Article experience by the HTML5 Hub and Intel<p>Inside a darkened conference room in the Miami Beach Holiday Inn, America’s most badass hackers …

Cybersecurity

Sorry – the page you are looking for has been removed

This is because it was advertisement feature content that was published as part of a commercial deal and funded by an advertiser.<p>It is Guardian News and Media policy to take down paid-for content at the end of these deals.<p>Click here for more on our commercial content guidelines.<p>If you want to …

Through Google Glass -- Preparing Digital Forensics and Cyber Security Education

Google Glass, the voice-controlled glasses that act as a wearable computer, recently became available to a handful of initial testers. After participating in an application process and submitting a proposal on how I would use the product, I was selected as a Glass Explorer for Google. As an …

Forensics

Why planning is key to combating cyber threats and attacks

Last month's cyber security report by Kent University offered a startling insight into the challenges faced in combating escalating cyber threats. According to the research, about 9 million Brits saw their online accounts hacked in the past year, with 8% of the population claiming to have lost …

Blocked Website? Don't Call a Plumber, Use Google Translate.

Here’s an incredibly useful trick for anyone who lives in a country that restricts access to websites, or uses a controlled version of the Internet at work or school. You can turn to Google Translate to access blocked websites, as this thread on Reddit explains.<p>Type or copy/paste the URL into …

NSA Allegedly Spies On International Credit Card Transactions

Germany’s Der Spiegel newspaper – increasingly joining the NSA revelations train – reports today that the intelligence agency is interested in international credit card transactions and may have found a way to monitor payments processed by companies including Visa. Spiegel alleges it has even set …

These are the codes you need to crack to get a job as a British cyberspy

A website, canyoufindit.co.uk, just went live. It contains 28 sets of five letters and one set of three letters. There are five answers. If you get them right, you may be on your way to joining GCHQ, Britain’s signals-intelligence agency, in either the “cyber and technical operations,” “maths and …

Freedom of Information

6 Ways You Invite Hackers to Steal Your Personal Information

There are simple steps you can take to reduce your risk of becoming a victim of identity theft and financial fraud.<p>Chances are you’re not doing …

The NSA Can Access Basically Everything On iOS, Android and Blackberry

I guess we're not even surprised at this point. Der Spiegel is reporting that internal NSA documents prove the agency's widespread smartphone data …

Toshiba has invented a quantum cryptography network that even the NSA can’t hack

If you’ve got communications that absolutely cannot be intercepted—whether you’re a NSA whistleblower, the president of Mexico, or Coca-Cola—quantum cryptography is the way to go.<p>It harnesses the bizarro-world properties of quantum physics to ensure that information sent from point A to point B …

Quantum Computing

Apple Patents iOS Unlocking Methods That Determine Level Of User Access To Device Features And Software

A big request from parents regarding iOS has been that Apple implement user accounts on its mobile devices, in order to make it so that a parent can sign in with greater access to device features and apps than a child, for instance. It’s a system that already has an analogue on the desktop, and …

If you Knew you Were Going to be Attacked, What Would you do Differently?

Recent reports have found that cyberattacks against U.S. corporations are on the rise, along with an increase in international threats, especially …

Cybersecurity

China Hit with Biggest DDoS Attack in its History

The China Internet Network Information Center (CNNIC), which maintains the registry for .cn, issued an apology and a notice that at 2 and 4 in the …

The NSA has its own team of elite hackers

Our Post colleagues have had a busy day. First, they released documents revealing the U.S. intelligence budget from National Security Agency (NSA) leaker Edward Snowden. Then they recounted exactly how the hunt for Osama bin Laden went down.<p>In that second report, Craig Whitlock and Barton Gellman …

Struggling With Attack Detection And Analysis

New survey shows organizations don't know when they've been attacked and can't easily determine scope of attacks<p>Enterprises are increasingly finding …

Cybersecurity

The Evolution of Things: The Next Phase of Security

Recently, I attended DEFCON, a yearly security conference held in Las Vegas, Nevada. For the uninitiated IT security professional or casual reader, …

Las Vegas

Exclusive: Army Admits To Major Computer Security Flaw

Army's Deputy of Cybersecurity told BuzzFeed a security failure can allow unauthorized access to computer files. Instead of fixing it, they are telling soldiers to be more careful.<p>The United States Army's Deputy of Cybersecurity Roy Lundgren has confirmed with BuzzFeed the existence of a major …

U.S. Army

How to Encrypt Your Email and Keep Your Conversations Private

Between constant password breaches and the NSA looking in on everything you do, you've probably got privacy on the mind lately. If you're looking for …

Information Systems

With Nymi Wristband, Your Heartbeat Unlocks Your Devices

Could be convenient<p>Here's a twist on knowing thy heart. A startup is looking to manufacture a wristband that recognizes its wearer by his or her heartbeat. The wristband, called Nymi, then communicates with wearers' other devices—laptops, tablets, smartphones—to unlock them when their owners pick …

Nymi bracelet uses biometric heart data to unlock digital and physical doors (video)

Unlike faces and fingerprints, a heart's electrical activity is difficult to fake -- it's a unique and potentially ideal security tool. Bionym is taking advantage of this trustworthiness in its upcoming Nymi bracelet. The wristwear authenticates users through a combination of electrocardiograms and …

Secret History: The Story of Cryptology

In Secret History: The Story of Cryptology, author Craig Bauer notes that most available cryptology books primarily focus on either mathematics or …

Mathematics