Joseph Lin

1,846 Flips | 11 Magazines | 10 Likes | 1 Following | 234 Followers | @joseph_lin | Keep up with Joseph Lin on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Joseph Lin”

Data Privacy Rules Must Apply To Apps, Browsers: Telecom Regulator Chief

TRAI has recognised individuals as the actual owners of personal information and said entities were mere custodians.<p><b>New Delhi:</b><p>Mobile devices and apps …

Online Privacy

‘The Warning Lights Are Blinking Red Again’

One of President Trump’s outstanding appointments has been Dan Coats, his director of national intelligence. Coats is a former House member, former …

United States

Malware Threatens Medical Device Security

Hospitals must contend with older operating systems that lack the latest security patches, and cope with the convergence of medical devices, EHRs, …

Information Security

Despite the security measures you've taken, hacking into your network is trivial

Whatever cybersecurity policies and technologies you have implemented, it's not enough. Unauthorized access remains a simple exercise for hackers. A …

trivial

Mobile cybersecurity is a hellish nightmare that’s getting worse by the day

Despite screaming headlines about the growing vulnerabilities of mobile devices and promises to take the matter seriously, both individuals and corporations alike are still essentially walking around with their pants around their ankles.<p>Over the past two years, the use of mobile devices, …

Cybersecurity

Another Crypto Fail: Hackers Steal $23.5 Million from Token Service Bancor

A controversial cryptocurrency project known as Bancor—which last year raised $153 million to create a digital token exchange—hit another stumble: On …

Cryptocurrency

Scientists Discover Hottest, Most Improbable Way to Steal Your Passwords

Scientists have discovered a new way to capture people’s passwords, though the circumstances needed for the attack to work make the odds of it being …

Mission Impossible

Synthetic Diamonds Lead Princeton Team to Quantum Computing Breakthrough

Natural diamonds didn't work, so they made their own from scratch.<p>Storing quantum bits of information, or qubits, is a lot harder than storing …

Quantum Physics

Evolutionists have just found new evidence that supports the Biblical account of CREATION!

Thanks to new DNA research, Evolutionary scientists have just found new evidence that supports that Biblical account of creation! Here’s what they …

Evolution

California lawmakers just passed one of the toughest data privacy bills in the country

California lawmakers passed one of the toughest data privacy laws in the United States today, as they faced pressure from an even stronger ballot measure in the state.<p>The California Consumer Privacy Act of 2018 is set to dramatically change how businesses handle data in the most populous state. …

Privacy

Feds ran a bitcoin-laundering sting for over a year

Operation Dark Gold targeted dark-web drug dealers, offering cash in exchange for tainted cryptocurrency<p>More than 40 alleged dark-web drug dealers have been arrested as part of a sweeping federal effort described by the Department of Justice as “the first nationwide undercover operation targeting …

Darknet

Marketing Firm Accidentally Exposes 340 Million Records Online

The reported data leak at Exactis potentially exposes every adult in the US to the risk of identity theft. The records contain detailed personal …

Databases

You’ll want to perk up when it comes to the new ‘Lazy State’ Intel CPU bug

A new security vulnerability in a similar vein to Spectre and Meltdown has been discovered in Intel CPUs. The “Lazy FP state” flaw makes use of the …

A Mix-Up Meant Malware Could Have Posed as Apple Software, and Nobody Noticed for Over 10 Years

Security researchers on Tuesday unveiled a method that could’ve allowed hackers to bypass a wide range of commercial products designed to protect …

Ticketfly Confirms Hack Exposed Personal Information of 27 Million Accounts

One week after suffering a hack that took its website and services offline, events ticketing company Ticketfly revealed Thursday just how bad the …

US takes aim at Russian hackers who infected over 500,000 routers

More than half a million routers and network devices in 54 countries have been infected with sophisticated malware, researchers from Cisco's Talos Intelligence Group warn.<p>The malware, which the security researchers are calling VPNFilter, contains a killswitch for routers, can steal logins and …

Prime suspect in CIA ‘Vault 7’ hack still hasn’t been charged

Last year WikiLeaks published a ton of secret documents about the Central Intelligence Agency's (CIA) hacking capabilities. The breach -- the largest loss of classified documents in the agency's history -- revealed its far-reaching abilities to snoop on modern technology, including software …

New Vega Stealer malware seizes payment info from Chrome and Firefox

<b>New malware designed to steal financial data and passwords from Chrome and Firefox has been discovered by researchers.</b><p>Proofpoint says the malicious …

The cryptocurrency attack featured on Silicon Valley is real, but it doesn’t work like that

The 51 percent attack doesn’t let you delete all of the users<p><i>Spoilers</i> <i>for the trailer</i><i>of</i> <i>Silicon Valley’s</i> <i>season finale</i><i>.</i><p>Tonight’s <i>Silicon Valley</i> season finale is titled “Fifty-One Percent,” and according to the trailer for the episode, it features a crazy twist centered on what’s called a 51 percent …

Equifax Now Says Over 56,000 Driver's Licenses, Passports, and Other IDs Were Stolen, Too

Credit-reporting agency Equifax has revealed new details this week about the personal data of customers exposed in last year’s data breach.<p>In …

Android App With 10 Million Downloads Left Users’ Photos and Audio Messages Exposed to Public

The developers of Drupe, a popular Android app, left its users' data, including selfies and audio messages, on insecure, publicly accessible Amazon cloud servers.<p>An Android app with more than 10 million downloads left users’ selfies, pictures, audio messages, and other sensitive data exposed online …

Apps

Ransomware like WannaCry, NotPetya, and SamSam threatens global finances and security

Imagine that in a few days, or maybe a few years, the United States suffers an unprecedented ransomware attack.<p>Maybe it begins 30 days after tax day …

Hackers Steal Data on 14 Million Users From Ride-Hail App Careem

Careem, a ride-hail startup based in Dubai and operating in 14 countries, announced today that hackers stole data belonging to 14 million riders and …

Hackers Designed a 'Master Key' to Unlock Millions of Hotel Room Doors

A critical flaw in electronic locks left millions of hotel rooms worldwide vulnerable to hackers. Now, the security researchers who developed the …

Ransomware infects Ukraine energy ministry website

<b>Hackers have used ransomware to take the website of Ukraine's energy ministry offline and encrypt its files.</b><p>The website currently contains a message written in English, demanding a ransom of 0.1 bitcoin - worth $927.86 (£664.98) by today's exchange rate.<p>Ukranian cyber-police spokeswoman Yulia …

Hyperledger bug bounty program goes public

The open-source blockchain project is now asking the public to help in the quest to squash bugs impacting the platform.<p>The Hyperledger project has …

PowerHammer lets hackers steal data from air-gapped computers through power lines

Researchers exfiltrated data at 1000 bits per second by listening in on the electrical connection of a computer.<p>Building a slide deck, pitch, or …

Ransomware tops malicious attack charts

<b>Ransomware has become the most popular form of malware used in cyber-attacks, suggests a study.</b><p>Almost 40% of all successful malware-based attacks involved ransomware suggests the annual Verizon data breach investigations report.<p>The types of systems compromised were changing too, it found, with …

New Study Makes Clear Just How Risky It Is to Be a Security Researcher

New research from the Center for Democracy and Technology aims to help security researchers decide what level of risk is acceptable for them and …

Privacy

If your computer has slowed, you might be mining crypto coins for someone else — here's how to stop it

Good news: Virtually all traditional types of malware declined in the past few months. Not so good: mainly because hackers are more interested in using your computer to help them mine cryptocurrencies.<p>It's likely you, or your employer, aren't even aware it's happening. Malware miners latch onto …