Stefan ATC

594 Added | 1 Magazine | 3 Following | 211 Followers | @FLIP_ATC | Keep up with Stefan ATC on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Stefan ATC”

Hackers Distribute Malware-Infected Media Player to Hundreds of Mac Users

Yet another software supply-chain attack hits popular applications.<p>Hackers managed to compromise the website of a company that develops several popular apps for Apple computers, distributing malware-infected versions of those apps to hundreds of users.<p>Security researchers from antivirus firm ESET …

Media Players

Dubai police reveal new Scorpion hoverbike at GITEX

Last week's Gulf Information Technology Exposition (GITEX) showcased <i>The Rise of the Machines</i>, one machine rising above them all: a new hoverbike for the Dubai police force. Developed with Russian company Hoversurf using that company's recently released, battery-powered Scorpion-3 model as a base, …

Drones
Cybersecurity

Passwords as we know them are dying, here's what will take their place

Weak passwords offer many hackers an entry point into enterprises. Here's what the future of security will look like.<p>As employees remain the no. 1 …

Information Systems

We Asked 6 Privacy and Legal Experts About Apple’s New Face ID

Here’s an answer to every question you have about Apple’s latest innovation.<p>Apple executives stood on stage Tuesday and revealed the way we'll unlock the brand new iPhone X: with our faces, using a new feature called Face ID.<p>It utilizes the selfie camera's "TrueDepth" camera system—a set of sensors …

Privacy

11 Tips To Protect Yourself Against Online Romance Scams

Hundreds of thousands of women and men worldwide fall victim to online romance scams every year. Reported losses in the U.S. alone top $230 million annually, although the FBI estimates that only 15 percent of such crimes are reported and the actual losses are much higher. Most of that money will …

Identity Theft

For 20 Years, This Man Has Survived Entirely by Hacking Online Games

A hacker says he turned finding and exploiting flaws in popular MMO video games into a lucrative, full-time, job.<p>Manfred's character is standing still in the virtual world of the 2014 sci-fi online multiplayer game <i>WildStar Online</i>. Manfred, the real life person behind the character, is typing …

Hacking

Can your smart home be used against you in court?

On a November, 2015 morning in Bentonville, Arkansas, first responders discovered a corpse floating in a hot tub. The home’s resident, James Andrew Bates, told authorities he’d found the body of Victor Collins dead that morning. He’d gone to bed at 1 AM, while Collins and another friend stayed up …

Privacy

Saudi Arabia warns of new crippling cyberattack

Five years ago Saudi Arabia suffered the world's biggest cyberattack. Now it's on red alert for a repeat.<p>A warning was issued by the elite computer security team that helps guard Saudi Arabia's infrastructure, the Computer Emergency Response Team.<p>"Following a recent cyberattack which targeted …

Saudi Arabia

Survey: Americans Have Kinda Just Given Up on Cybersecurity

Two results from the latest survey at the Pew Research Center paint a dismal picture of the typical Americans’ approach to cybersecurity. As it turns …

6 key tips for keeping hackers out of your smart home

If forecasts and research firms have it right, pretty much everything in your home might soon be connected to the internet, from your fridge to your …

Information Systems

iPhone lock screen hack puts your private messages and nude pics at risk

Your iPhone might not be as secure as you think – even when your device is locked and protected with a passcode.<p>Popular tech YouTuber iDeviceHelp has uncovered a new exploit that could potentially give attackers access to your iPhone, including contact information, message logs as well as photos. …

This $5 Device Can Hack Your Locked Computer In One Minute

A new plug and hack device can steal your cookies even if your computer is locked.<p>Next time you go out for lunch and leave your computer unattended at the office, be careful. A new tool makes it almost trivial for criminals to log onto websites as if they were you, and get access to your network …

Raspberry Pi

ATM skimmer caught in the wild by a real security engineer

Whoda thunk it? Tourist/cybersecurity expert Benjamin Tedesco was hanging out in Vienna when he walked up to an ATM. Because he trusts no one he decided to give the reader a little tug and came away with a working skimmer designed to look exactly like the card slot on the original machine.<p>“It pays …

Forensics

Hackers are using this nasty text-message trick to break into people's accounts

It requires a second level of proof of who you are — typically a code sent to your phone — before you can log in. This prevents anyone from gaining unauthorised access to your account, even if they manage to get hold of your password.<p>However, hackers and hijackers are managing to find ways around …

Authentication

The shocking truth of how you'll be tracked online and why

A recent study, Online tracking: A 1-million-site measurement and analysis, conducted by researchers at Princeton University discovered that Google …

Google voice search records and keeps conversations people have around their phones – but the files can be deleted

Google could have a record of everything you have said around it for years, and you can listen to it yourself.<p>The company quietly records many of the …

Hotmail

U.S. judges can now issue search warrants on computers in any jurisdiction

<i>(Reuters)</i> – The Supreme Court on Thursday approved a rule change that would let U.S. judges issue search warrants for access to computers located in any jurisdiction despite opposition from civil liberties groups who say it will greatly expand the FBI’s hacking authority.<p>U.S. Chief Justice John …

Apple’s best defense against the FBI is the one it can’t share publicly

With Apple vowing to resist all the way to the Supreme Court the FBI’s demands for an iPhone backdoor in the San Bernardino case, many people assume the company is motivated purely by principles and concern for their customers.<p>No doubt these are key reasons for Apple’s stand, and I have great …

Privacy

This Net-Firing Cannon Can Take Down a Drone Without Destroying It

Behold SkyWall100, the latest in a string of new tools to neutralize problematic drones. This shoulder-mounted cannon can capture a drone with a …

Pirates hack into shipping company’s servers to identify booty | Ars Technica

Pirates used backdoor in shipping company's website to target freighters.<p>When the terms "pirate" and "hacker" are used in the same sentence, usually …

Information Security

A drone could take out a plane before the UK works out how to police our decentralized sky

“Serious” potential drone collisions are on the increase in the UK according to air safety watchdog the Airprox Board, with 23 near misses with aircraft investigated in just six months last year, including 12 that were given the top danger rating.<p>In December, a drone “came very close to colliding …

Cybersecurity
Cybersecurity
Airlines

Why J.P. Morgan Chase & Co. Is Spending A Half Billion Dollars On Cybersecurity

J.P. Morgan Chase & Co.’s Form 10-Q Quarterly Report — which was filed on August 3, 2015 with the United States Securities and Exchange Commission — provides a partial explanation as to why the firm is planning to spend a half billion dollars on cybersecurity. That number is twice the $250 million …

Cyber-attacks
Civil Aviation