Eric Spangler

307 Flips | 4 Magazines | 22 Likes | 8 Following | 2 Followers | @jonerics | Keep up with Eric Spangler on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Eric Spangler”

China Hacked a Navy Contractor and Stole 600GB of Data

Hackers working for the Chinese government compromised a US Navy contractor and stole a massive cache of highly sensitive data, including details …

Military

Russian VPNFilter Router Malware Much Worse Than Thought: What to Do

Remember that Russian router malware warning from last week? The situation is even worse than we originally thought, and a whole lot more router …

Wi-Fi

The next 9/11 will be a cyberattack, security expert warns

A cyberattack of devastating proportions is not a matter of if, but when, numerous security experts believe.<p>And the scale of it, one information …

Cybersecurity

Hands off my data! 15 default privacy settings you should change right now

On the Internet, the devil’s in the defaults.<p>You’re not reading all those updated data policies flooding your inbox. You probably haven’t even looked for your privacy settings. And that’s exactly what Facebook, Google and other tech giants are counting on.<p>They tout we’re “in control” of our …

Privacy

Hacking macOS: How to Remotely Eavesdrop in Real Time Using Anyone's MacBook Microphone

Google, Amazon, and Facebook are always listening. But what's worse? Hackers are listening, too. Windows PCs are particularly vulnerable, but with a …

Information Security

Hacker Kevin Mitnick shows how to bypass 2FA

A new exploit allows hackers to spoof two-factor authentication requests by sending a user to a fake login page and then stealing the username, password, and session cookie.<p>KnowBe4 Chief Hacking Officer Kevin Mitnick showed the hack in a public video. By convincing a victim to visit a …

AWS Cloud Services: 20 Amazon Services You Might Not Know About (But Should)

The cloud computing leader continues to roll out new services related to machine learning, containerization, virtual reality, application development …

With paper and phones, Atlanta struggles to recover from cyber attack

ATLANTA (Reuters) - Atlanta's top officials holed up in their offices on Saturday as they worked to restore critical systems knocked out by a nine-day-old cyber attack that plunged the Southeastern U.S. metropolis into technological chaos and forced some city workers to revert to paper.<p>On an Easter …

Cybersecurity

Justice Department shuts down massive cybercrime ring

The US Justice Department said it's taken down a cybercrime behemoth, which had sold millions of people's stolen information before it closed.<p>The agency announced on Wednesday that it's charged 36 individuals who allegedly ran Infraud, a massive forum with more than 10,900 members globally. The …

Corruption

Cloud computing will virtually replace traditional data centers within three years

Cloud data center traffic will represent 95 percent of total data center traffic by 2021, says Cisco.<p>The use of cloud computing services and …

ATM jackpotting reaches US shores

The hacking technique forces ATMs to cough up large sums of cash.<p>ATM manufacturers Diebold Nixdorf and NCR have warned that jackpotting attacks have …

Hacking Tools List for Hackers & Security Professionals

Penetration testing & Hacking Tools Tools are more often used by security industries to test the vulnerabilities in network and applications. Here …

How a Tiny Dot Lets Criminals Impersonate Most Banks Online | Inc.com

A small, rarely used special character is potentially helping criminals trick people into falling prey to all sorts of online scams, and businesses -- including some of the world's leading media companies and financial institutions -- appear to be woefully unprepared.<p>Here is what you need to know …

IT security

WTF is GDPR?

European Union lawmakers proposed a comprehensive update to the bloc’s data protection and privacy rules in 2012.<p>Their aim: To take account of seismic shifts in the handling of information wrought by the rise of the digital economy in the years since the prior regime was penned — all the way back …

The Grand Tor: How to Go Anonymous Online

Fifteen years have passed since a couple of MIT grads and a Navy-funded researcher first built The Onion Router, or Tor, a wild experiment in …

Researchers find almost EVERY computer with an Intel Skylake and above CPU can be owned via USB

The Intel Management Engine (IME) is a component of virtually every Intel CPU released after 2008. Think of it as a CPU on top of a CPU; it does tasks separate from the main operating system while the computer is in use. Intel argues that it can be used to do remote administration tasks, although …

Nearly undetectable Microsoft Office exploit installs malware without an email attachment

Security firm Sophos uncovered a zero day exploit that targets a 24-year-old data exchange protocol, and it can be used to silently attack machines …

Fear the Reaper? Experts reassess the botnet's size and firepower

Security researchers now say the botnet could be only as big as 28,000 infected devices, but warn that the figure could balloon in size at any given …

Here's the 2018 Cybersecurity Almanac | Inc.com

Almanacs are annual publications that include predictions for the upcoming year based on an analysis of facts known at the time of publication. In past generations, for example, almanacs served as important resources for farmers developing their planting strategies for upcoming seasons. As we enter …

Cybersecurity

How to make your passwords worthless to cyber thieves

When IBM introduced the first laptop with a built-in fingerprint sensor in 2004, it sparked a wave of product development in biometrics. At the time, a colleague delighted in fooling sensor after sensor with a rubber replica of his own finger.<p>The best way to make your accounts more secure is to …

Identity Theft

Protect Your Small Business From Cyber Attacks With These Free Tools

Defend against hackers and cybercrime with free email theft protection and easy-to-use cybersecurity tools.<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>Cyber crime damages are predicted to cost the world $6 trillion annually by 2021, up from $3 trillion in 2015, according to a …

Hackers are using a terrifying new method for stealing cash out of ATMs

Hackers have a new hands-off approach to stealing money out of ATMs.<p>A report from Trends Micro says there is a shift in the ATM malware landscape …

No, Your Incognito Browser Isn’t Actually Private. Here's How to Safely Surf the Internet

Because investing in your online privacy has never been more critical.<p>With data breaches like the Equifax hack becoming more common, investing in …

The practical guide to fighting ransomware

Close your eyes for a second. Imagine you are in charge of an IT security team in an enterprise, where the headcount is measured in the thousands. …

52 Cloud Terms You Need to Know

Although the cloud is not a new topic, it does have constantly changing services and offerings. As a means to help get ahead of the many new …

The Cassini spacecraft crashed into Saturn, ending a successful 20-year mission

PASADENA, Calif. — NASA scientists just received their last message from the Cassini spacecraft, which plunged into Saturn early Friday morning. Those final bits of data signal the end of one of the most successful planetary science missions in history.<p>“The signal from the spacecraft is gone and …

Astronomy

What is Bashware? Nearly 400 million PCs at risk from new attack method that could hide any malware

Bashware makes use of Windows' in-built Linux shell to make any malware essentially undetectable to security products.<p>A new attack method uncovered …

Billions of Bluetooth devices could get hit by this attack

More than 5.3 billion devices with Bluetooth signals are at risk of a malware attack newly identified by an internet of things security company.<p>If you're not keeping count, that's most of the estimated 8.2 billion devices that use Bluetooth, which allows for our gadgets to connect and communicate …

Cybersecurity

Hackers lie in wait after penetrating US and Europe power grid networks

Intrusion into power companies' operational networks is a dramatic escalation.<p>Nation-sponsored hackers have penetrated the operational networks …

Beware of hotel Wi-Fi — Russian hackers are stealing information from it

Hotel guests already have enough anxiety-inducing fodder to make their stays a bit less than desirable. From the odd stain on the carpet to the …

Harley Quinn