Scott Mullen

30 Added | 1 Magazine | 5 Likes | 1 Follower | @mullenscott | Keep up with Scott Mullen on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Scott Mullen”

Log In or Sign Up to View

This Facebook post is no longer available. It may have been removed or the privacy settings of the post may have changed.

Technology News

Amazon touts its technology and start-up culture at first Australian innovation day.<p>Cambridge Analytica said it was one of hundreds of companies …

Cambridge Analytica

Wi-Fi signals enable gesture recognition throughout entire home

UW News<p>Forget to turn off the lights before leaving the apartment? No problem. Just raise your hand, finger-swipe the air, and your lights will power …

Don’t Hash Secrets

Building secure systems is difficult. It would be nice if we had a bunch of well-designed crypto building blocks that we could assemble in all sorts …

Why Businesses Should Share Intelligence About Cyber Attacks

Today’s business leaders are allocating more resources to cyber security, yet appear to have less to show for it. The reason for this disconnect: the fundamental paradigm driving cyber security has not changed with the times.<p>Most businesses try to prevent cyber attacks by focusing on their internal …

Anatomy of a hack: even your 'complicated' password is easy to crack

In March, readers followed along as Nate Anderson, Ars Technica deputy editor and a self-admitted newbie to password cracking, downloaded a list of …

How to Enable Two-Factor Authentication on All Your Accounts

Twitter rolled out two-factor authentication last week, joining a growing group of tech companies to support the important security feature. …

Anonymous Twitter Account Hacked By Rival Group 'Rustle League'

Your Anon News, a subset of the hactivist collective Anonymous, had its Twitter account hacked early Friday morning by a rival group of hackers.<p>The little-known "Rustle League," a group that the U.K.'s Vice has characterized as Anonymous' "dedicated trolls," got access to the account at around 2:30 …

Obama ordered cyber attack target list to be created, according to leaked document

President Obama hasn't been shy about engaging the public and other nations on digital issues, and that includes the idea of cyber warfare. While his administration has been pretty aggressive in building up our cyber defenses, our offensive capabilities have remained somewhat more mysterious. …

What Is PRISM?

Last night, the Washington Post and Guardian dropped concurrent bombshell reports. Their subject was PRISM, a covert collaboration between the NSA, …

Smile! Hackers Can Silently Access Your Webcam Right Through The Browser (Again)

You know those people who put tape over their laptop’s webcam to keep digital peeping toms at bay? They’re not crazy.<p>A new proof of concept is making the rounds today that demonstrates how a hacker can snap pics off your webcam, right through the browser, with no consent required.<p>Well, technically, …

Learn How To Slim Your Wallet | Smart Leather Wallets With Less Bulk

Close Show inside +<p>4 – 11+ cards, flat bills, coins<p>Close Show inside +<p>2 – 10 cards, flat bills<p>Close Show inside +<p>5 – 12+ cards, flat bills, …

This Flash Drive Sports a Keypad, 256-bit Encryption, and Government Specs to Keep Your Spy Files Top Secret

There are USB flash drives and then there is the Aegis Secure Key.<p>First off, this thing is government rated on a variety of levels. Not only can it …

The Most Overlooked Part of Your Data Security

Organizations constantly replace outdated computers, servers, laptops, copiers, and countless other types of electronic devices to keep up with technology and enhance worker productivity. This rush to upgrade, however, creates a challenge: large numbers of excess electronics must be managed and …

NSA gets early access to zero-day data from Microsoft, others | Ars Technica

Meant to help secure network, data could be used to attack foreign governments<p>The National Security Agency (NSA) has used sensitive data on network …

LinkedIn

LinkedIn

Microsoft warns of new Trojan hijacking Facebook accounts

Malware focusing on the social network's users in Brazil masquerades as a legitimate Google Chrome extension and Firefox add-on.<p>Microsoft has issued a warning that a new piece of malware masquerading as a Google Chrome extension and Firefox add-on is making the rounds, threatening to hijack …

Malware

PayPal's chief information security officer says passwords' days are numbered

Recently speaking at the Interop IT conference, PayPal's chief information security officer, Michael Barrett, stated that passwords and PINs were operating on borrowed time. Barrett hopes to replace online security keys with a setup that's a blend of software and hardware-based identification. He …

Why Two-Factor Authentication Won't Stop The Hacking Crisis

Important? Yes. But not foolproof. Hackers find their way through the internet's next great safeguard.<p>As high profile hacks continue to make news, "two-factor authentication" is becoming a household term. This year alone, Apple, Microsoft, and Evernote have rolled it out to users, and two weeks ago …

Onion Inc.'s Tech Blog

This is a write-up of how the Syrian Electronic Army hacked The Onion. In summary, they phished Onion employees’ Google Apps accounts via 3 seperate …

US government is now the biggest buyer of malware, Reuters reports

Former officials warn US hacking threatens cybersecurity<p>The US government is waging electronic warfare on a vast scale — so large that it's causing a seismic shift in the unregulated grey markets where hackers and criminals buy and sell security exploits, Reuters reports.<p>Former White House …

Financial Times’ Twitter, tech blog hijacked by the Syrian Electronic Army | Ars Technica

FT is part of a growing list of media companies duped by the Pro-Assad crew.<p>Add the <i>Financial Times</i> to the growing list of media companies whose …

Hacker serving 5-year sentence invents ATM add-on to prevent theft | Ars Technica

Device rotates ATM cards, prevents skimmers from stealing data.<p>A criminal serving a five-year sentence "for supplying gadgets to an organized crime …

Cyber crime 'costs small companies £800m a year’

An explosion in cyber crime is costing small companies almost £800m a year, a business group has warned.<p>The Federation of Small Businesses (FSB) said issues such as hacking, data security breaches and computer viruses were a “barrier to growth” that could no longer be ignored.<p>An FSB report found …

Chinese hackers gained access to 'thousands' of surveillance orders, says Washington Post

When Chinese hackers attacked Google in 2009, they may have gained access to years' worth of government surveillance records, <i>The Washington Post</i> reports. Google reported the hack publicly years ago, saying that the "sophisticated" attack resulted in the theft of Google intellectual property and the …