elijah mcneil

33 Flips | 11 Magazines | 2 Likes | @elijahmcneil | Keep up with elijah mcneil on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “elijah mcneil”

2017 security predictions – Stay vigilant, we’re in for a wild Ride

2016 brought about more cyber attacks than we thought possible, especially involving ransomware, and we definitely won’t see that trend breaking …

Worried Internet Users Flock to Encryption App After Donald Trump Election

The election of Donald Trump has some internet users worried about their privacy and safety, resulting in a significant uptick in demand for the …

Security News This Week: What Trump's Win Means for Cybersecurity

Last month, we at WIRED posed the hypothetical: "Imagine if Donald Trump Controlled the NSA." The notion at the time seemed unlikely but disturbing: …

Here’s Yahoo saying it was hacked much earlier than previously reported — and it is being sued 23 times so far for the breach

Its regulatory filing dropped the day after Election Day, the better to keep it hidden!<p>Earlier this week the day after Election Day — a day absolutely guaranteed to take focus off it — Yahoo said in a regulatory filing that it had knowledge for two years that a “state-sponsored actor” was hacking …

Financial Regulation

Internet-destroying outages were caused by "amateurish" IoT malware

Some of the internet's most popular, well-defended services -- including Twitter -- were knocked offline yesterday by a massive denial-of-service …

Hacker steals at least 58 million personal records from data management firm

Hardly a day goes by lately when we don’t hear about a massive data breach. Whether it’s a major retail outlet like Home Depot, an electronic auction …

Nuclear Power Plant Disrupted by Cyber Attack

The head of an international nuclear energy consortium said this week that a cyber attack caused a “disruption” at a nuclear power plant at some …

Cybersecurity

Amazon alerts some users of password change following email leak

Amazon customer? You might’ve received an email yesterday from the online retail giant about a change to your account settings — specifically, your …

Marissa Mayer Is Being Scapegoated for Yahoo's Cyber Scandals

Just as the Yahoo CEO Marissa Mayer was triumphantly navigating the firm into the later stages of its promising deal with Verizon, a series of …

Thanks To Encryption, Governments Need Companies Like Yahoo To Spy on Users

Now that more and more data is encrypted, it will be harder and harder for governments to spy—unless internet companies help them.<p>Last year, the US government asked Yahoo to scan all its customers emails to look for the digital "signature" of certain method of communication used by a terrorist …

The Difference Between Two-Factor and Two-Step Authentication

You know you should use two-factor authentication everywhere you can, but there’s also “two-step” authentication, which may come off like the same …

Information Systems

What Yahoo’s NSA Surveillance Means for Email Privacy

<i>Updated October 7, 2016 with additional clarification and analysis of Yahoo’s denial</i>Dear ProtonMail Community,Two weeks ago, we published a security …

Privacy

Yahoo’s Government Email Scanner Was Actually a Secret Hacking Tool

Contrary to recent reports, the spy tool Yahoo used to search its users emails was not just a custom version of its spam and child pornography filtering system.<p>The spy tool that the US government ordered Yahoo to install on its systems last year at the behest of the NSA or the FBI was a "poorly …

Yahoo Has Reportedly Been Spying on Hundreds of Millions of Its Mail Users

Yahoo (yhoo) last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by …

How DNS can be used to unmask Tor users

Researchers have found a way to use DNS traffic monitoring to deanonymize Tor users based on Tor exit relay usage.<p>DNS traffic monitoring can be used …

Information Security

Why the internet of things is the new magic ingredient for cyber criminals | John Naughton

The massive attack on Brian Krebs’s website presents huge problems for investigative reporters<p>Brian Krebs is one of the unsung heroes of tech journalism. He’s a former reporter for the <i>Washington Post</i> who decided to focus on cybercrime after his home network was hijacked by Chinese hackers in 2001. …

Cybersecurity

Apple has been ordered to pay VirnetX $302.4 million in patent lawsuit

A jury has ordered Apple to pay $302.4 million to VirnetX Holding Corp. after it found that the tech giant's FaceTime feature infringed on the VirnetX's patents related to secure communications. The case will now go to the United States Court of Appeals for the Federal Circuit in Washington, …

Yahoo confirms 500 million accounts compromised in huge data breach

Yahoo has confirmed that hackers stole information from at least 500 million user accounts in what it describes as a “state-sponsored” attack.<p>In a statement released Thursday, Yahoo’s Chief Information Security Officer Bob Lord said that the information was stolen from the company’s network in late …

Facebook ads still slipping past Adblock Plus via stripped-down code

The Adblock Plus crowdsourced hacker militia can’t keep up with Facebook’s disciplined army of engineers.<p>When Facebook first announced it would circumvent ad blocking software, Adblock Plus (ABP) built a workaround in two days, boasting that “We promised that the open source community would have a …

Digital Advertising

The United Kingdom could be getting its own 'Great British Firewall'

The National Cyber Security Center (NCSC) is exploring the creation of a national internet filter, according to Ciaran Martin, the head of Britain’s newly-formed cybersecurity agency. While the plan is to use the filter to weed out malicious websites and software, for some citizens the mere …

Cybersecurity

Anti-encryption bill changes would limit some effects on security

A Senate bill that would demand encryption backdoors may be on ice for now, but it's now poised to come back -- with a few limitations. <i>Just Security</i> claims to have obtained proposed changes to the bill that would scale back its requirements to placate critics of its effect on privacy and security. …

Chrome cracks down on sites that don't use encryption

Chrome is embarking on a crusade to crack down on websites that still aren't using encryption, and it starts with the latest version of the browser, Chrome 56.<p>Chrome 56 is launching in January, and will implement a new warning that you'll see on any login sites that are still unencrypted. The pages …

​Chrome to warn when insecure websites expose your passwords

Google's Chrome browser soon will begin warning you when websites aren't securing your passwords or credit card numbers properly, an early step in the company's plan to fundamentally change how we view encryption on the web.<p>Encryption scrambles data so eavesdroppers can't understand information …

Researchers have built the first ransomware for smart thermostats

Security experts have constructed the first ransomware for smart thermostats, according to Motherboard.<p>On August 6, at cybersecurity conference Def Con, hackers Andrew Tierney and Ken Monroe revealed the malware that infected a Linux-based internet connected thermostat. The white hat hackers said …

Cybersecurity

Public yawns at threat of cyber crime

The seemingly inpenetrable National Security Agency was hacked recently. So was the Democratial National Committee, and voter registration offices in …