Digital Security

By Wesley Fryer | Wesley Fryer created a magazine on Flipboard. “Digital Security on Flipboard” is available with thousands of other magazines and all the news you care about. Download Flipboard for free and search for “Wesley Fryer”.

The “Cobra Effect” that is disabling paste on password fields

Back in the day when the British had a penchant for conquering the world, they ran into a little problem on the subcontinent; cobras. Turns out there …

Millions of Verizon customer records exposed in security lapse | ZDNet

Customer records for at least 14 million subscribers, including phone numbers and account PINs, were exposed.<p>An Israeli technology company has …

Security

I Got Hacked and All I Got Was This New SIM Card

Yesterday evening, I was driving to the airport to drop off someone and noticed my phone had zero bars on AT&T: the "No Service" text was listed …

SIM Cards

When Companies Get Hacked, Should They Be Allowed to Hack Back?

It’s an idea that resurfaces after high-profile cyberattacks, despite most firms’ lack of enthusiasm about it.<p>There is an old debate (at least, counting in internet years) that tends to crop up after major cybersecurity breaches such as the widespread WannaCry ransomware attack in May. In the …

Cybersecurity

DJI Is Locking Down Its Drones Against a Growing Army of DIY Hackers

Drone hackers have forced DJI into an arms race.<p>The tension between drone pilots who want complete control over their aircraft that they bought and DJI, the world's biggest consumer grade drone maker, has come to a head. An arms race between hackers and the company is earnestly underway.<p>On YouTube, …

Drones

Windows 10 Has Halved Data Collection: Privacy Watchdog

When Microsoft launched Windows 10, one of the major flashpoints of disagreement between the company and its users were Microsoft’s Windows 10 data …

Privacy

Petya Ransomware: What It Is, Who's Behind It, How to Stop It

We still don't have all the facts on the Petya ransomware worm that struck Europe yesterday (June 27), and more information is still coming out. But …

Security

A strange new kind of ransomware is sweeping the internet

On Tuesday, Windows computers — first in Ukraine, later across Europe and the United States — began to show users a message that looked something like this:<p>This is called ransomware, a relatively new form of malware that scrambles a victim’s files and then demands a payment to unscramble …

Security

Tuesday’s massive ransomware outbreak was, in fact, something much worse

Payload delivered in mass attack destroys data, with no hope of recovery.<p>Tuesday's massive outbreak of malware that shut down computers around the …

Security

Google’s Elite Hacker SWAT Team vs. Everyone

One Friday Afternoon in February, Tavis Ormandy, a virtuosic security researcher with a brown buzz cut and an uneasy smile, was performing some …

Security

Hackers claim responsibility for Skype outage

<b>A hacking group is claiming responsibility for connectivity problems affecting Skype over the last two days.</b><p>The Skype outage began on Monday 19 June at 19:01 GMT.<p>There have been numerous complaints that people were unable to log in, receive messages or make voice calls.<p>Hacking group CyberTeam …

EU Proposes Enforcing Data Encryption and Banning Backdoors

The European Parliament's Committee on Civil Liberties, Justice, and Home Affairs has published draft proposals that would enforce end-to-end encryption on all digital communications and forbid backdoors that enable law enforcement to access private message data.<p>The proposed amendment relates to …

Why Girl Scouts Make Great Cybersecurity Hackers

Your favorite cookie sellers are in training to become white hat hackers.<p>On Thursday, Girl Scouts of the USA announced a new partnership with Palo …

A Complete Guide To Switching From HTTP To HTTPS

HTTPS is <b>a must for every website</b> nowadays: Users are looking for the padlock when providing their details; Chrome and Firefox explicitly mark …

Web Design

Why You Shouldn’t Use SMS for Two-Factor Authentication (and What to Use Instead)

Security experts recommend using two-factor authentication to secure your online accounts wherever possible. Many services default to SMS …

Fireball Malware Infects 250 Million Computers Worldwide

A massive malware campaign has already infected 250 million Windows and Mac OS computers worldwide.

Search Engines

Defence Secretary refuses to deny nuclear submarines run outdated system exploited by hackers

Defence Secretary Michael Fallon has refused to deny that Britain’s nuclear submarines use the outdated Windows XP program amid the ongoing WannaCry …

Russia attempted to hack U.S. voting software days before election: NSA document

A newly published National Security Agency report shows that Russian hacking went further than previously known<p>A newly leaked National Security Agency document describes how Russia launched a major hacking effort shortly before the 2016 presidential election.<p>The document, according to a report by …

What being robbed and stranded in my bikini taught me about how to react in a true crisis

Last weekend, I had my bag stolen from a private event at a hotel in Austin. I lost all the normal things—laptop, wallet, dignity—but what was unique about the situation was that it was a pool party. Meaning I was in my bikini. And most of my clothes were in my bag—the bag that was by now likely on …

Up to 36 million Android smartphones may be infected with this malware

Forty-one Android apps infected with malicious software were removed from the Google Play Store on Thursday, but cybersecurity experts believe that …

Keybase Extension Brings End-to-End Encrypted Chat To Twitter, Reddit, GitHub

A recently released Chrome extension, developed by the public key crypto database Keybase, brought end-to-end encrypted messaging to several apps …

Identity thieves used stolen data 9 minutes after it was posted online

When personal data is dumped online, it can take just nine minutes for bad guys to start using it, according to a report from the Federal Trade Commission.<p>Over the course of three weeks in April and May, the FTC analyzed what happens when hacked personal data is shared online.<p>Researchers created …

Identity Theft

Scientists now able to ‘SEE through walls’ using Wi-Fi

SCIENTISTS have created a way to see through walls using Wi-Fi, leading to major privacy concerns.<p>Boffins have developed a system to create images of …

Will a VPN hide me from the Snoopers’ Charter?

The short answer is that it'll definitely help<p>Much has been written about the Investigatory Powers Act 2016, or Snoopers’ Charter, but despite …

Chipotle finds malware exposed credit card info across the US

Hackers stole credit card information from customers at Chipotle restaurants across the United States between March 24th and April 18th, the company announced today. Chipotle revealed in April that it had been the victim of an attack, and today it shared details about the type of information stolen …

NSA Chief Admits Donald Trump Colluded with Russia

When will Admiral Rogers say publicly what he told his agency’s workforce?<p>President Donald Trump’s firing of FBI director James Comey continues to …

How to build your own VPN if you’re (rightfully) wary of commercial options

While not perfect, either, cloud hosting providers have a better customer data record.<p>In the wake of this spring's Senate ruling nixing FCC privacy …

Medical Devices Hit By Ransomware For The First Time In US Hospitals

Is it possible that North Korea used a stolen National Security Agency hacking tool to infect medical devices at U.S. hospitals? Turns out, in today’s topsy-turvy world, it is.<p>When the NSA cyber weapon-powered WannaCry ransomware spread across the world this past weekend, it infected as many as …

Security