Steve Ozan

652 Added | 3 Magazines | 180 Likes | 2 Following | 126 Followers | @steveozan | Keep up with Steve Ozan on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Steve Ozan”

Experts have 2 theories for how top-secret NSA data was stolen, and they're equally disturbing

Some former agency employees believe that the alleged group behind the leak, the "Shadow Brokers," may have hacked an NSA server that had a top-secret hacker toolkit left there by mistake.<p>Others believe that the Brokers may be just a smokescreen for another possibility: an agency mole.<p>"The key …

Security

Citi Fintech Chief Bails on Bank After Only 10 Months on the Job

Heather Cox was named head of Citi Fintech in October 2015. After less than a year of attempting to guide one of the largest banks in the world …

USAA

Pokemon Go players themselves are the real prey, privacy expert warns

A German data privacy commissioner has warned against "Pokemon Go," the hit mobile game. It's a "giant data collection machine," Marit Hansen says, …

Pokémon

How Hackers Could Get Inside Your Head With ‘Brain Malware’

Brain-computer interfaces offer new applications for our brain signals—and a new vector for security and privacy violations.<p>Hackers have spyware in your mind. You're minding your business, playing a game or scrolling through social media, and all the while they're gathering your most private …

University of Washington

Trump suggests US accept Russia's annexation of Crimea

WASHINGTON (AP) — Republican presidential candidate Donald Trump is suggesting the U.S. accept Russia's annexation of Crimea if it would lead to better relations with Moscow and stronger cooperation in fighting Islamic State militants.<p>That view runs counter to the Obama administration, which …

Donald Trump

Search

13 hours ago<p>13 hours ago<p>14 hours ago<p>14 hours ago<p>14 hours ago<p>16 hours ago<p>16 hours ago<p>16 hours ago<p>17 hours ago<p>17 hours ago

Do not connect to Wi-Fi, and other tips for hanging out with 20,000 hackers in Las Vegas

Two of the largest conferences in the hacking world will be happening — Black Hat USA and Def Con — along with a Darpa competition between autonomous computers right in the middle of both.<p>More than 20,000 people are likely to attend.<p>But what should you expect while you're there? Should a new …

Security

The Hacker Who Turns Office Equipment into Bugging Devices

A clever hack could broadcast sensitive secrets over radio frequencies.<p>You think about securing your laptop, but what about your desk phone, monitor, or printer?<p>In the second episode of <i>Can I Hack It?</i>, made possible by <i>Mr Robot</i> on Amazon Prime, we explore the security of "embedded devices"—objects …

Security

Workplace Lessons I Learned from NBC’s 'The Office' After It Was Too Late

Do yourself a favor and watch all nine seasons before starting your next job.<p>I was in seventh grade when <i>The Office</i> premiered, making me far too young to appreciate the chilling truths behind all the jokes. I had no idea how realistic the show was in portraying the daily indignities of the modern …

Comedy

Donald Trump invites Russia to hack into Clinton's emails, an extraordinary step for a presidential nominee

Donald Trump dared a foreign government to commit espionage on the U.S. to hurt his rival on Wednesday, smashing yet another taboo in American political discourse and behavior.<p>"Russia, if you're listening, I hope you'll be able to find the 30,000 emails that are missing," he said, referring to …

Trump invites Russian hackers to find Clinton's missing emails

Republican presidential nominee Donald Trump on Wednesday invited Russian hackers to find and publish Hillary Clinton's emails.<p>"Russia, if you're listening, I hope you're able to find the 30,000 [Clinton] emails that are missing," Trump said at a press conference. "I think you will probably be …

Government

DNC email leak: Russian hackers Cozy Bear and Fancy Bear behind breach

Cybercriminals also referred to as Guccifer 2.0 have invaded the White House, state department and German Bundestag between them, security firms say<p>Guccifer 2.0, the hacker behind the recent Democratic party email leak, is not a single operator but Russian cybercriminals designated Fancy Bear and …

Security

Is Computer Security Becoming a Hardware Problem?

The co-author of the TLS standard has some concerns about the complexity of our machines.<p>In December of 1967 the Silver Bridge collapsed into the Ohio River, killing 46 people. The cause was determined to be a single 2.5 millimeter defect in a single steel bar—some credit the Mothman for the …

Information Security

A bank ATM scam is sweeping the nation – here’s how to avoid it

Bank customers throughout the UK have been falling victim to a ‘distraction scam’, in which criminals literally distract a person at a cash machine for a few brief seconds, in which time they can gain full access to that person’s account.<p>Barclays bank has now issued a new video to warn the public …

Android porn app takes pictures of users, demands ransom

A malicious pornography app for Android has been extorting people who download it by taking pictures of them.<p>Adult Player demanded $500 (£330) from …

Google Play

These Are The Programs ISIS Uses To Remain Anonymous Online

There’s a big push among ISIS members to enhance technical knowledge, specifically of software that could be used to counteract surveillance. …

Why People Act So Oddly In Elevators

What’s up with how people act in elevators?<p>When two people who don’t know each other find themselves alone in an elevator, they invariably stand as far away from each other as possible. They certainly don’t face one another, and it’s unlikely they make eye contact or speak. If the elevator is …

Psychology

Banks, Retailers, And Phone Makers Each Have Mobile Payment Apps, Maybe Overwhelming Consumers

Is it possible to confuse consumers with too many apps for making in-store payments wtih their mobile phones? Retailers and stores hope not, since …

Apps

Santander Bank To Pay $10M Fine Over Alleged Illegal Overdraft Practices

Santander Bank has agreed to pay $10 million to settle federal regulatory allegations that it illegally charged overdraft fees to customers who …

Banking

Blockchain-based banking backend Vault OS from ex-Googler emerges from stealth mode

Despite holding the vast majority of the world’s wealth (or perhaps because of that), banks aren’t exactly hotbeds of cutting-edge tech, often relying on decades-old systems for everyday tasks. ThoughtMachine, a company led by ex-Google engineer Paul Taylor, is looking to change that with a modern, …

Blockchain

China Hacked FDIC And Agency Covered It Up

A scathing congressional report points the finger at hackers sponsored by the Chinese government for their role in a series of hacks against the U.S. …

Cybersecurity

WALL STREET JARGON DECODED: A former Goldman Sachs analyst explains how to talk like a banker

Alan Li, a former Goldman Sachs analyst, explained some popular banker jargon on a recent episode of his podcast, "The Vampire Squid."<p>"Financial jargon," Li said, "is any financial professional's way of saying something very direct in a very abstract way."<p>Here are seven key financial phrases, …

Goldman Sachs

5 Ways You're Reducing Your Social Security Benefit

No one's going to look out for you but you.<p>Social Security is a critical program that provides a financial foundation for seniors across America, and …

Retirement

What Wall Street’s Obsession With Blockchain Means for the Future of Banking

<i>Howard Yu</i> <i>is professor of strategic management and innovation at IMD. He specializes in technological innovation, strategic transformation and change</i> …

Wall Street

CISSP certification: Are multiple choice tests the best way to hire infosec pros? | Ars Technica

Focus on skills instead of certifications like the CISSP, experts argue.<p>Want a job in infosec? Your first task: hacking your way through what many …

Employment

Homeland Security's big encryption report wasn't fact-checked

If you watch <i>Marvel's Agents of S.H.I.E.L.D.</i>, <i>Blacklist</i>, or any other TV show with make-believe espionage, you probably hear the term "going dark" at least once a week.<p>In the real world, "going dark" has become FBI shorthand for when baddies can't be spied on, or manage to vanish into thin internet, …

On The Dark Web, Medical Records Are A Hot Commodity

In the hidden recesses of the Internet, millions of people’s medical records are up for sale to criminals.<p>For John Kuhn, a routine visit to a hospital in Michigan turned into a $20,000 bill for surgery that he never actually received.<p>Kuhn, who works as a senior threat researcher at IBM, later …

Identity Theft

Identity Theft Soars As Fraudsters Mine Online Social Media Profiles

Prolific sharers on social media might be putting themselves at increased risk of identity fraud, according to security experts.<p>A new report from …

Identity Theft

Kingfisher Airlines’ account books go missing amid fraud probe

<b>Mumbai:</b> The investigation into an alleged fraud at the now defunct Kingfisher Airlines Ltd has run into an unlikely hurdle: the airline’s books of …

India