Greg BarronLong-form Journalism If You Bought a Smart TV on Black Friday, the FBI has a Warning for You Inc Magazine - Jason AtenYour brand-new smart TV might have all the latest technology, but it's still vulnerable to hackers. It's hard to imagine that simply doing something that hundreds of thousands, if not millions, of people
Greg Barron How To: Find Passwords in Exposed Log Files with Google Dorks wonderhowto.com - Kody You may not have thought of dorks as powerful, but with the right dorks, you can hack devices just by Googling the password to log in. Because Google …
Greg Barron Hit by ransomware? Victims of these four types of file-encrypting malware can now retrieve their files for... ZDNet - Danny Palmer Cybersecurity researchers crack the codes of FortuneCrypt, Yatron, WannaCryFake and Avest ransomware, allowing victims to get their files back …
Greg Barron The 6 Best Free Malware Removal Tools of 2019 Lifewire - Jeremy Laukkonen Malware has become a commonplace problem, since it's easier than ever to pickup malware, even when you think your internet behavior isn't risky. …
Greg BarronOpinion Pay The Ransom Or Else - Two Free Ransomware Tools Can Save You Forbes - TJ McCueRansomware is a type of malicious software, or malware, designed to stop an individual or company from using their computer system until a monetary ransom is paid, according to the Cybersecurity and Infrastructure
Greg Barron The 6 Best Free Virus Removal Software of 2019 Lifewire - Jerri Ledford Virus removal tools are sometimes stand alone, one-time scanners that will conduct a quick scan of your system and remove any malicious software that …
Greg BarronIcon version of the Flipboard logo SOHOpelessly Broken 2.0 - Independent Security Evaluators securityevaluators.com Security Vulnerabilities in Network Accessible Services Research by: Shaun Mirani, Joshua Meyer, Rick Ramgattie. and Ian Sindermann Internet of Things …
Greg BarronMobile T-Mobile Has a Secret Setting to Protect Your Account From Hackers That It Refuses to Talk About VICE - Lorenzo Franceschi-BicchieraiT-Mobile has a feature that gives its customers more protection from hackers trying to steal their phone number, but you probably don't know it exists because the company doesn't advertise it publicly
Greg Barron SIM-based attack has been used to spy on people for two years Engadget - Jon FingasIn a few cases,your SIM card may pose more of a security risk than your phone's software. AdaptiveMobile Security researchers say they've discovered a new vulnerability, nicknamed Simjacker, that's being
Greg Barron A new app can detect Bluetooth credit card skimmers on gas pumps TechCrunch - Zack WhittakerA team of computer scientists has built a new app that can wirelessly detect credit card skimmers, often found discreetly placed on gas pumps and bank ATMs. Gone are the days where entire card skimmers
Greg BarronIcon version of the Flipboard logo How To: Find Vulnerable Webcams Across the Globe Using Shodan wonderhowto.com - Kody Search engines index websites on the web so you can find them more efficiently, and the same is true for internet-connected devices. Shodan indexes …
Greg BarronMobile Technology How to Find Spyware Your Employer Installed on Your Computer and What to Do About It Gizmodo - David Nield There are employers and IT departments out there that take an extreme approach to monitoring what the staff gets up to on company-owned equipment. …
Greg Barron Check If Your Android Device Has Been Infected by Malicious Adware Lifehacker Another wave of sketchy apps has been banned from the Google Play Store. This time around, the offending apps all came from one publisher, CooTek, …
Greg Barron Protect Yourself With Malwarebytes, The Most Advanced Anti-Malware Software futurism.com - Futurism Creative With Malwarebytes, you can rest assured that your computer is fully protected from any and all cyber security threats. Back in the day it was pretty …
Greg BarronOpinion Stealthy TrickBot Malware Has Compromised 250 Million Email Accounts And Is Still Going Strong Forbes - Lee MathewsA strain of malware known as TrickBot has been infecting victims since 2016. It's still going strong today -- in fact many in the cybersecurity world consider it the top threat targeting businesses right
Greg Barron Why you should really, really update your Logitech wireless dongle The Verge - Sean HollisterThree and a half years ago, a security researcher broke into my laptop without ever needing to touch it. He didn’t even need its network address. All he had to do was sniff out my Logitech wireless mouse’s
Greg BarronTechnology How to securely erase the data off your iPhone or iPad, Android device, Windows PC, hard drives, SSDs, and... ZDNet - Adrian Kingsley-Hughes It's good to have a bit of healthy paranoia when it comes to keeping your data safe and secure. Making sure that your personal information is safely …
Greg Barron Warning: free hotel wifi is a hacker’s dream The Guardian - John NaughtonAny intelligence service that hasn’t been inside the systems of Trump’s Washington hotel ought to be fired for incompetence You’ve just arrived at the hotel after a delayed flight and a half-hour wrangle
Greg BarronApps Critical Warning Issued Regarding 10 Million Samsung Phone Updates Forbes - Davey WinderMore than 10 million users of Samsung smartphones have done the right thing in looking to manage firmware updates that improve and secure the running of their devices. Unfortunately, they may well have
Greg Barron How to make sure no one is spying on your computer Popular Science - David NieldA program that spies on your computer activity is one of the most dangerous forms of malware. It won't present you with a ransomware request or announce it's deleting your files. Instead, it'll hide silently
Greg BarronIdentity Theft How To: Find Identifying Information from a Phone Number Using OSINT Tools wonderhowto.com - Kody Phone numbers often contain clues to the owner's identity and can bring up a lot of data during an OSINT investigation. Starting with a phone number, …
Greg BarronHow-To's Here Are the Best Account Security Methods, According to Google Lifehacker - David Murphy Everywhere you turn, someone is handing out advice about account security and privacy. And while it never hurts to be reminded about all the ways you …
Greg Barron Who Is On My Wi-Fi? Lifewire - Jonathan Terrasi If you've ever wondered who is using your Wi-Fi, you're not alone. By now, most people understand the need to secure the Wi-Fi networks provided by …
Greg Barron Key lessons from an ethical hacker computerweekly.com It is critically important for organisations to know how cyber criminals target their victims, says Joseph Carson, chief security scientist and …
Greg BarronComputer Hacking How To: Probe Websites for Vulnerabilities More Easily with the TIDoS Framework wonderhowto.com - Kody Websites and web applications power the internet as we know it, representing a juicy target for any hacker or red team. TIDoS is a framework of …
Greg BarronMobile Technology Internet Explorer zero-day lets hackers steal files from Windows PCs ZDNet - Catalin Cimpanu Microsoft refused to patch issue so security researcher released exploit code online. A security researcher has published today details and …
Greg BarronCybersecurity This Simple Tool Will Reveal the Secret Life of Your Smart Home Gizmodo - Kashmir Hill We live in the glorious future that technophiles have long dreamed of. Almost everything can now connect to the internet: cameras, coffee pots, …
Greg Barron How To: Intercept Security Camera Footage Using the New Hak5 Plunder Bug wonderhowto.com - Kody In a previous guide, I demonstrated how to extract images from a security camera over Wi-Fi using Wireshark, provided you know the password. If you …
Greg Barron Best File Encryption Tool: TrueCrypt Lifehacker - Jason Fitzpatrick Last week we asked you to share your favorite file encryption tool. We tallied up the votes and put the five top contenders before you in the Hive …