Jeremy Horowitz

53 Flips | 1 Magazine | 32 Likes | 2 Following | 1 Follower | @JeremyHorow2016 | Keep up with Jeremy Horowitz on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Jeremy Horowitz”

Stupid, stupid MacOS security flaw grants admin access to anyone

UPDATED: The latest version of macOS includes a mindlessly simple, one-step way to take over any Mac.<p><i>Video: High Sierra's biggest changes aren't</i> …

Here's How Cell Phone Encryption Works

There's a complex bit of tech in your pocket.<p>That computer you carry round in your pocket is a treasure trove of data, ripe for the hacker to swoop …

Information Systems

How a Wi-Fi Pineapple Can Steal Your Data (And How to Protect Yourself From It)

The Wi-Fi Pineapple enables anyone to steal data on public Wi-Fi networks. Here’s how it facilitates two sophisticated network attacks and how to protect yourself against them.<p><i>This article is part of</i> How Hacking Works<i>, Motherboard's guide to demystifying information security.</i><p>In popular media, …

Science says: Yes, your dog really does love you

One of my favorite kinds of news stories is the report of a new scientific study that verifies the obvious. You’ve seen them. New research finds that …

Scientific Research

Unsettling things your smartphone is quietly recording about you

Apple’s new Face ID feature, which will let people unlock the forthcoming iPhone X by simply looking at it, has left some feeling deeply unsettled.<p>The new technology uses a series of sensors and cameras on the front of the phone to map and learn its owner's face over time. The company has lauded …

Names and definitions of leaked CIA hacking tools

The WikiLeaks-hosted “Vault7” collection of documents allegedly leaked from within the CIA’s Computer Operations Group is a messy mix of jargon, incomplete info and broken (or redacted) links. The information is interesting, but it’s quite difficult to find a basic description of many of the terms …

The 5 Worst Things to Do Before a Run

Don’t make these beginner mistakes before you hit the road<p>If you’re new to running, it’s vital to prep your body correctly before heading out the door. And in the long term, warming up right will also help ensure your success as a runner. But how do you get your body primed properly? In my …

This will change everything about locking your Android smartphones using patterns - IBTimes India

Regardless of how complex your pattern lock is on your Android smartphones, attackers can crack it within five attempts.<p>From numerical PIN codes and …

USPS police force expands cybercrime unit to fight dark net drug dealers

The U.S. Postal Inspection Service is expanding its presence online, targeting dark net drug dealers and their use of snail mail in distributing …

The workout to build a massive chest and get rid of your man-boobs

undrey / Getty<p>undrey / Getty<p><b>Duration</b> 30–45<p><b>Exercises</b> 6<p><b>Equipment</b> Yes<p>We'll be direct, gentlemen: Nobody likes a guy with man-boobs—especially not the …

Soon cops will search your phone just like your car

Imagine a routine traffic stop during which the officer has the legal right to search not just your car, but your phone too.<p>That's where we're likely headed: A Florida court recently denied Fifth Amendment protections for iPhone passcodes, saying suspects must now reveal them to police. The …

What is encryption?

Recently, we've had a few questions about encryption. We've talked about how Android incorporates encryption and the changes that Nougat brings, and …

The Phone Cracking Industry Is a 'Cesspool'

Although dominated by giants, the phone cracking industry is littered with unsavory episodes.<p><b>This is part of a Motherboard mini-series on the proliferation of phone cracking technology, the people behind it, and who is buying it. Follow along here.</b><p>Lawsuits. Bribery. Companies not paying for …

Forensics

US State Police Have Spent Millions on Israeli Phone Cracking Tech

A Motherboard investigation shows how one company in particular, Cellebrite, has cornered the market in state agencies' use of phone cracking technology.<p><b>This is part of a Motherboard mini-series on the proliferation of phone cracking technology, the people behind it, and who is buying it. Follow</b> …

Forensics

5 Killer Pushup Variations for Greater Gains

The poor old push up is a miserable exercise. It doesn't get a lot of love and generally just sits there by itself in the corner.<p><b>Well, what if I told</b> …

Passwords and hacking: the jargon of hashing, salting and SHA-2 explained

Keeping your details safe in a database is the least a site can do, but password security is complex. Here’s what it all means<p>From Yahoo, MySpace and TalkTalk to Ashley Madison and Adult Friend Finder, personal information has been stolen by hackers from around the world.<p>But with each hack there’s …

Personal Information

USB stick turns 64-bit x86 systems into Linux thin clients

Igel has launched a “UD Pocket” USB stick that boots up a VDI environment on any 64-bit x86 PC, laptop, or other device without overwriting its local …

The U.K. has passed a snooper’s charter. The U.S. could be next.

An ill wind is blowing in places that have championed freedom.<p>This erosion of civil rights didn’t start in the era of Donald “Burn the flag, go to …

Privacy

Firefox 0-day in the wild is being used to attack Tor users

Publicly released exploit works reliably against a wide range of Firefox versions.<p><b>Update on 11/30/2016 2:20 PM California time:</b> Firefox developer …

Which operating system do 'professional' hackers use?

Which operating system do ‘real’ hackers use?<p>Which operating system do the ‘real’ hackers use? The real here is the cyber criminal type hackers and …

Linux

FBI admits it can break into almost any device it wants to unlock

In 2016, in over 80% of its cases, the agency was reportedly able to unlock devices and access user data.<p>The FBI has reportedly acknowledged that in …

The FBI likely ran nearly half the child porn sites on the dark web in 2016

Earlier this year we brought you an in-depth exposé of how, for 12 days in February and March, the Federal Bureau of Investigation (FBI) ran the world’s largest child porn site, Playpen. According to newly unsealed documents, Playpen wasn’t the only site containing child pornography on FBI …

Privacy

Here's Trump's plan to stop hackers

The incoming Trump administration wants to audit the security of the federal government's computer systems -- a massive undertaking -- and strengthen the hacking division of the U.S. military.<p>President-elect Donald Trump unveiled his four-part cybersecurity strategy last month.<p>It's getting mixed …

FBI seized 23 Tor-hidden child porn sites, deployed malware from them [Updated]

Researcher: FBI was likely enabled to run half of all child porn sites on the servers.<p><b>UPDATE Sunday 12:41pm ET</b>: We have clarified our original story …

Worried about the NSA under Trump? Here's how to protect yourself

We don’t yet know Trump’s surveillance plans, but follow these guidelines if you think it’s better to be safe than sorry<p>In January 2017, Donald Trump will become President of the United States of America, and the most technologically advanced surveillance infrastructure in the world will start …

What Trump means for tech

<b>Now the shock is beginning to subside, attention is moving to how Donald Trump's policies will play out over his four, possibly eight-year stint as president.</b><p>Barack Obama's policies on technology were considered pro-innovation, with a view to using technology expertise to improve government systems …

Could your 'smart' home be a weapon of web destruction?

<b>Do you use a webcam to check on Tiddles the cat or Bonzo the dog while you're at work?</b><p>If so, you could be unwittingly turning your internet-connected "smart" home into a weapon of web destruction.<p>That's the unsettling conclusion to be drawn from the recent web attacks that made use of a botnet army …

Cyberattacks put new focus on search-warrant rule change

The Justice Department is citing last week's internet outages caused by widespread cyberattacks to support allowing U.S. agents to search online devices in faraway locations with approval from a single judge. Lawmakers on Thursday expressed renewed reservations about a change some see as expanding …

Leaked Emails Show How Apple Tried to Lobby the Clinton Campaign on Encryption

The revelations from Wikileaks’ dump of hacked emails from Hillary Clinton’s campaign chair John Podesta keep coming. Newly unearthed messages show …

Tim Cook

The FBI Insists It Doesn’t Fire People Over Polygraphs. This Man Says It Happened To Him.

The story of a former FBI intelligence analyst and his two-year battle to get his job back.<p>WASHINGTON ― Logan tried to stay calm as he boarded the subway to take the one-mile trip from his office at FBI headquarters to Patriots Plaza. He could have walked, but he didn’t want to risk getting sweaty …