Tara Shachter (TheWishingPanda)

30 Flips | 2 Magazines | 32 Likes | @TaraShachte406r | Keep up with Tara Shachter (TheWishingPanda) on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Tara Shachter (TheWishingPanda)”

When will Companies Take Data Security Seriously?

PACEDm.comIf it seems like data breaches at major organizations such as the recent one from Equifax are becoming more and more common, it isn’t just …

Identity Theft

The US Is Not Protecting Its Data | Articles | Big Data

With the Russia investigation looming large, it would be easy to forget that the US government engages in a significant amount of hacking of its own. …

Cybersecurity

Shadowy cyber-espionage group 'Sowbug' has been hacking diplomatic secrets for years

Mysterious group hits South America and south east Asia with 'Felismus' software.<p>A shadowy cyber-espionage group that has operated in secret since at …

Sprint Won't Stop Emailing Customers' Personal Information to This Random Person

For years, Amy Kono, a 35-year-old project manager from California, <b></b>has been getting emails from Sprint that aren’t meant for her. She doesn’t get …

DDoS Flaw Found in Brother Printers

11/6/2017<br>04:00 PM<p>50%<p>50%<p>All Brother printers with a Debut Web front-end carry a flaw that allows attackers to distribute a single malformed HTTP POST …

Information Security

Chrome Has a Malware Problem, and Google Needs to Fix It

Google's Chrome browser has been praised for continuously upgrading its own security. Chrome OS, which is based on the browser, is one of the safest …

Hackers can gain access to your computer monitor — a cybersecurity expert shows us how easy it is

Everyone knows your computer can be hacked, but did you know your monitor might also be used against you? Ang Cui from Red Balloon Security has figured out a way to hack into a popular Dell monitor and manipulate what you see on your screen. Using this type of attack, a user could easily be tricked …

North Korean hackers 'stole US-South Korean war plans'

North Korea has reportedly stolen joint US-South Korea war plans, including details on how Kim Jong-un is to be assassinated during a potential conflict.<p>Pyongyang’s secret army of hackers broke into the intranet of South Korea’s Defence Ministry in August and September last year and compromised a …

North Korea

Mac malware caught silently spying on computer users

Mac users typically think they're immune to malware. But a new strain used for spying reminds us even Macs can be compromised<b>.</b><p>Researchers have found an unusual piece of malware, called FruitFly, that's been infecting some Mac computers for years.<p>FruitFly operates quietly in the background, spies on …

Spying

Data Breaches Happening at Record Pace, Report Finds

The number of data breaches in the U.S. jumped 29 percent in the first half of this year, hitting a record high of 791, according to a new report from the Identity Theft Resource Center and CyberScout, the data risk management company.<p>“Frankly, I was surprised at how significantly the number of …

Identity Theft

Hackers are targeting hotel Wi-Fi with particularly evil malware

Just because your hotel offers complimentary Wi-Fi, it doesn’t mean you have to take it. Hackers may be lurking, looking to compromise your computer, …

Wi-Fi

Report: Cyber-attacks could cost us more than hurricanes

Cyber-attacks could soon be costlier than natural disasters, says Lloyd’s of London. A new report from the specialty insurer claims economic losses related to the cyber threat in the US could be as high as $121 billion.<p>The cyber insurance market, which Lloyd’s estimates to be worth around $3 …

Cybersecurity

What is Broadpwn? Google fixes bug that allows millions of Android phones to be remotely hacked

Broadpwn is linked to a flaw in Broadcom WiFi chips and also affects iOS devices.<p>Millions of Android phones are at risk of being remotely hacked due …

The Biggest Cybersecurity Disasters of 2017 So Far

The first six months of 2017 have seen an inordinate number of cybersecurity meltdowns. And they weren't just your standard corporate breaches. It's …

The Era of Chaos-Inducing Ransomware Is Here and It's Scary as Hell

The ‘90s cyberpunk thriller <i>Hackers</i> is used too often to illustrate the fearful future of cyber security, but it’s popular for a reason. The film’s …

Google Drive has become a popular alternative to The Pirate Bay

Pirates went through a rough patch this past year. Shortly after KickassTorrents and its alleged owner Artem Vaulin went down, competing sites Torrentz.eu and TorrentHound swiftly followed suit. But while The Pirate Bay is still there to hold the fort, an unlikely alternative is starting to shape …

Google Drive

5 logo trends for 2017 you need to know about

We’ve said it before and we’ll say it again: nobody thinks good design is about copying others. But nor does good design exist in a vacuum. So it’s …