jcoleman05

224 Flips | 1 Magazine | 7 Likes | 7 Following | 17 Followers | @jcoleman05 | Keep up with jcoleman05 on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “jcoleman05”

How to protect yourself from 'SpoofedMe,' a social login attack

An IBM security team announced on Thursday that it had discovered a new website vulnerability that enables attackers to assume the identity of users …

Cyber thieves targeting rewards programs

The rewards programs that businesses offer to consumers are increasingly a target for hackers.<p>There is growing evidence of cyber thieves targeting …

The Ubiquity of Cyber-Espionage

First Look Media's Morgan Marquis-Boire and Crowdstrike's Dmitri Alperovitch on why nation-states are the hackers we should be most afraid of<p>Don’t worry about dorm-room hackers, crime rings, or the mafia, said two cyber-security experts Thursday at the Washington Ideas Forum.<p>Worry about the …

Hackers' new Dyre malware infects W.Pa. computers, vexes FBI cyber agents

Pittsburgh-based FBI cyber agents who brought down an international Russian hacking syndicate in May are now focusing on two new targets that have …

A New Age in Cyber Security: Public Cyberhealth

The cleanup aimed at disrupting GameOver Zeus and CryptoLocker offers an instructive template for managing mass cyber infections.<p>Public health …

Birth control of the future could be activated with a wireless remote

The device, developed by MicroCHIP, can last up to 16 years<p>The company MicroCHIP, based in Massachusetts, is developing a rather futuristic form of contraception: a microchip that lasts for 16 years and can be easily turned off, no doctor's appointment necessary.<p>The concept was conceived two years …

Are Sensors Leaving Your Systems Vulnerable To Hacking?

Twenty-six billion devices—from trucks, to appliances, to manufacturing equipment—will be connected to the Internet by 2020, according to a recent forecast by Gartner.<p>Adoption of connected devices and sensors as part of the growing Internet of Things (IoT) is increasing, in particular, in the …

​Android's phone wiping fails to delete personal data

Was that naked selfie you took really deleted before you sold your phone on eBay?<p>A new study from security software vendor Avast calls into question the effectiveness of Android's factory reset option, which many people have relied upon to delete personal data from their old smartphones before …

Personal Data

Chinese hackers turned focus to U.S. experts on Iraq -security firm

SAN FRANCISCO, July 7 (Reuters) - A sophisticated group of hackers believed to be associated with the Chinese government, who for years targeted U.S experts on Asian geopolitical matters, suddenly began breaching computers of experts on Iraq as the rebellion there escalated, a security firm said on …

UK set to defy EU by requiring collection of phone and browsing records

The UK government is set to pass emergency NSA-style measures requiring telecom companies to retain records of all web activity and phone calls in Britain for up to two years. That's happening over fears of radicalization of UK Muslims, heading in waves to the Middle East to fight in Syria and …

N.Korea 'doubles cyber war personnel'

Seoul (AFP) - North Korea has doubled the number of its elite cyber warriors over the past two years and established overseas bases for hacking …

Social engineering: How it's used to gain cyber information

As society becomes more dependent on digital information and devices, social engineering will remain one of the greatest threats to any security …

Social Issues

UK forges close cyber ties with China despite ‘endemic espionage’

As the US continues to take a hard line with China over alleged criminal hacking of American companies, UK cyber investigators have quietly forged relationships with their counterparts in China, the Guardian has learned.<p>Over the past six months, at least two meetings between the UK National Crime …

White House cyber czar's goal: 'Kill the password dead'

The White House cybersecurity czar is typically focused on strengthening online security methods.<p>Not so the common password, which is still the most …

U.S. Postal Service

Hackers Attack Hong Kong Pro-Democracy Websites

A number of distributed denial-of-service attacks took down the websites of several pro-democracy groups in Hong Kong, in an attack widely attributed …

Why the net neutrality debate also matters for VoIP

Advertisement<p>7 Comments<p>Credit: Shutterstock / imagedb.com<p>At my company, Zingaya, we work on VoIP solutions in click-to-call technology (which is one …

Citing “Intense Public Interest and Concern” Over Mass Surveillance, Judge Orders DOJ to Turn Over Secret Legal Opinions for Court to Review

Like Don Quixote Tilting at Windmills, Foreign Governments Fight the Wrong Enemy Post-Snowden

This is a challenging time for U.S. companies and the U.S. government. As a result of Edward Snowden's disclosures that started over a year ago, U.S. companies have been wrongly suffering commercial reprisals by some governments. Reaction to the disclosures, conflating the acts of the National …

New Ruling Shows the NSA Can’t Legally Justify Its Phone Spying Anymore

The Eleventh Circuit Court of Appeals said no this week to tracking your movements using data from your cell phone without a warrant when it declared …

Facebook To Use Your Web Browsing History for Targeted Ads, Here's How To Opt-Out Now

Surfing the Internet?? Facebook CEO <i>Mark Zuckerberg</i> is watching your every move on Web, and this time even more closure.<p>It’s not surprising that …

14-year-olds find manual online, hack an ATM during their school lunch hour

Two 14-year-old Canadian boys almost got into trouble last Wednesday, but somebody wrote them a nice note explaining that they were late getting back …

Second Chinese Army Unit Linked to Corporate Cyber-Espionage

A Chinese hacking group that has attacked U.S. and European aerospace and communications companies is almost certainly linked to the Chinese …

Cybersecurity

Simplocker Android malware locks up mobile data and demands a ransom

A fresh strain of criminal software has been discovered encrypting the data of Android smartphone owners, then demanding payment to unlock it.<p>The Simplocker ransomware scans victims' SD memory cards for certain files, including images, PDFs and other documents, and audio files, before locking them …

Peek Inside a Professional Carding Shop — Krebs on Security

Over the past year, I’ve spent a great deal of time trolling a variety of underground stores that sell “dumps” — street slang for stolen credit card …

How to Secure and Manage a Relative’s Computer

Sure, maybe your parents don’t need any help with their PC and your kids are better at technology than you are. But many geeks are called upon to be …

Fight internet surveillance, Reset The Net

It’s a year since the name Edward Snowden became world famous and a year since we learned that the USA’s National Security Agency has infiltrated the …

EFF Tells Court That The NSA Knowingly And Illegally Destroyed Evidence In Key Case Over Bulk Surveillance

We followed the back and forth situation earlier this year, in which there were some legal questions over whether or not the NSA needed to hang onto …

Surveillance

Latest Cyber Crime - InfoSec- Tech

In January and February 2018, the computers belonging to a U.S.<p>28 mins ago<p>The social media giant Facebook said on Thursday that a critical bug<p>5 hours …

Why NSA Critics Are Wrong About Internet Vulnerabilities Like 'Heartbleed'

In a recent article "Obama Policy on Zero Days Craps Out", Stanford's director of civil liberties Jennifer Granick made the case that the White House should be more forthcoming with its disclosures of "zero day" threats and other web/software vulnerabilities.<p>According to Granick, a recent statement …