Jeff Nolan

1,522 Added | 1 Magazine | 160 Followers | @jeffnolan54 | Keep up with Jeff Nolan on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Jeff Nolan”

The Pros and Cons of Automated Cybersecurity

By Phil GoldsteinMicrosoft’s recent Hexadite acquisition shows the trend is in favor of automation — but is that the best solution for your business?

Business Technology


Ad Blocking

Hackers can remotely steal fingerprints from Android phones

Researchers outline how hackers can attack your smartphone to steal your fingerprint on a "large scale" -- without anybody noticing.<p>Our fingerprints …

Android Phones

Ransomware Has Evolved, And Its Name Is Doxware

The latest form of malware holds computers hostage and compromises the privacy of conversations, photos, and sensitive files.

Information Security

Synaptics' new biometric solution combines fingerprint authentication with facial recognition

Synaptics is looking to take the lead in mobile security in 2017. After announcing an optical reader that can scan fingerprints through glass last …

Luggage Tag Code Unlocks Your Flights, Identity to Hackers

The security used for travel bookings worldwide is very poor and open to abuse.<p>PCMag reviews products independently, but we may earn affiliate …

Information Systems

Yahoo admits it’s been hacked again, and 1 billion accounts were exposed | Ars Technica

That's a billion with a b—and is separate from the breach "cleared" in September.<p>On December 14, Yahoo announced that after an investigation into …

IT security

91% Of Cyberattacks Start With A Phishing Email

Phishing remains the number one attack vector, according to a new study that analyzes why users fall for these lures.

Information Security

The Coolest Hacks Of 2016

No 400-pound hacker here: Lightbulb and 'do-gooder' worms, machines replacing humans to hack other machines, and high-speed car hacking were among …

The key cyber threats to businesses in 2017

The past year has been a pretty eventful one for many reasons, not least in the area of cyber security which has seen attacks gaining in …


Most iOS Apps In Enterprises Not Using Apple Encryption Feature

Despite a January 1, 2017 deadline, not many app vendors have switched on the Apple App Transport Security, according to a study by Appthority.


Most External PowerShell Scripts Are Malicious: Symantec

<b>PowerShell, the scripting language and shell framework that is installed by default on most Windows computers, is becoming a favored attack tool for</b> …

Google Determines that FIDO U2F Keys Improve Security

In a new two-year research study, Google researchers have concluded that the use of the FIDO Alliances' Universal 2nd Factor (U2F) standard, as part …

Biometric Technology Is Not A Cure-All For Password Woes

No single authentication token is infallible. The only real solution is multifactor authentication.

Information Systems

TalkTalk and Post Office customers hit by Mirai worm attack

Around 100,000 Post Office broadband customers in the UK have been hit by the same hack that disrupted the internet, TV and phone networks of a …

Deutsche Telekom

Bug Allows Activation Lock Bypass on iPhone, iPad

<b>Researchers have found a bug that can be used to bypass Apple’s Activation Lock feature and gain access to the homescreen of locked iPhones and iPads</b> …

Hacked in just six seconds: How criminals only need moments to guess card number and security code

Criminals can work out the card number, expiry date and security code for a Visa debit or credit card in as little as six seconds using guesswork, researchers have found.<p>Experts from Newcastle University said it was "frighteningly easy" to do with a laptop and an internet connection.<p>Fraudsters use …

Newly discovered router flaw being hammered by in-the-wild attacks | Ars Technica

Researchers detect barrage of exploits targeting potentially millions of devices.<p>Online criminals—at least some of them wielding the notorious Mirai …

Information Security

Muni recovers from computer hack as probe goes on

A security breach at the San Francisco Municipal Transportation Agency remained under investigation Sunday, three days after a computer hack struck.<p>Transit service was not disrupted over the busy Thanksgiving holiday weekend, but ticket machines were taken off-line Friday evening and all day …

San Francisco

Fooling Facial Recognition Systems

This is some interesting research. You can fool facial recognition systems by wearing glasses printed with elements of other people's faces.Mahmood …

Machine Learning

Tesco Bank blames 'systematic sophisticated attack' for account losses

<b>Tesco Bank's chief executive has blamed "a systematic, sophisticated attack" for the money taken from 20,000 of its customer accounts.</b><p>Benny Higgins said the bank knew "exactly" what the attack was, but could not say more because it was part of a criminal investigation.<p>He said all affected customers …

Identity Theft

This Virus Automatically Kills Smart Light Bulbs

In the future, hackers might black out cities by breaking into internet-connected light bulbs.<p>On Nov. 2, 1988, a computer at the Massachusetts Institute of Technology was infected with one of the first-ever self-spreading viruses. A few hours later, one of every ten computers in the world that were …

Home Automation

Tech support scammers take advantage of two year old Google Chrome bug to freeze PCs

Back in July 2014, a bug in the Google Chrome browser was discovered that allows developers to push thousands, or even millions of URLs into the …

LastPass makes password management free across all of your PCs, tablets and phones

As we increasingly depend on digital tools and cloud services for work and play, the need to effectively manage the security of those resources …

Information Systems

Blog home

Self-service password resets are a common part of many web applications. The typical password reset link is emailed to the user and contains a unique …

IT security

What is the Dirty COW vulnerability and how does it impact mobile security?

This week, details about the Dirty COW vulnerability (CVE-2016-5195) were made public. The vulnerability interested me because of the potential grand …

Information Security

“Most serious” Linux privilege-escalation bug ever is under active exploit (updated) | Ars Technica

Lurking in the kernel for nine years, flaw gives untrusted users unfettered root access.<p>A serious vulnerability that has been present for nine years …

Akamai: 12-Year-Old SSH Vulnerability Fueling Internet-Of-Broken-Things DDoS Attacks, And Worse

We've increasingly covered how the "internet of poorly secured things" has contributed to a rise in larger DDoS attacks than ever before. The …

This Handbag Designer's Payment System Was Just Hacked

Handbag and accessories maker Vera Bradley said on Wednesday hackers may have accessed customer data from payment processing systems in its stores, …