iPhone Android Smartphone Encryption Law Enforcement

This is the stupidest argument against iPhone and Android encryption we’ve ever heard

By on April 30, 2015 at 11:05 AM.

This is the stupidest argument against iPhone and Android encryption we’ve ever heard

Why are we so suspicious of law enforcement officials who are howling bloody murder about Apple and Google’s decision to encrypt smartphone traffic? Largely because they keep making totally boneheaded arguments. The latest such argument comes to us courtesy of Motherboard, which reports that Daniel Conley, the Suffolk County District Attorney in Massachusetts, has argued that widespread smartphone encryption will lead to an outbreak of perverts snapping “upskirt” photos of women who are riding public transportation. More →

No Comments
How To Crack A Master Lock Tips Video

Watch: A hacker has learned how to crack almost any Master Lock code in 8 tries or less

By on April 29, 2015 at 12:15 PM.

Watch: A hacker has learned how to crack almost any Master Lock code in 8 tries or less

We mostly think of hackers as people who use their knowledge of coding to virtually break into computer systems. It turns out, however, that hackers can be pretty good at breaking into physical locks as well. Via Ars Technica, hacker Samy Kamkar this week posted a video that shows how you can crack the code of a Master Lock combination in eight tries or fewer. More →

No Comments
White House Hack: Obama's Emails

Russian hackers accessed Obama’s email in ‘worrisome’ White House hit

By on April 27, 2015 at 6:50 AM.

Russian hackers accessed Obama’s email in ‘worrisome’ White House hit

Last year, hackers hit the unclassified computer network of the White House, accessing in the process the email correspondence between President Obama and some of the people he emails, or used to email frequently, The New York Times reports. Initially, the White House did not disclose this detail, and it’s not clear what kind of sensitive data has been stolen in the processes, but the Times learned the hack has been “more intrusive and worrisome” than publicly acknowledged. More →

No Comments
Groupon Security

Why Groupon refused to pay a security researcher who discovered serious XSS bugs

By on April 24, 2015 at 8:15 PM.

Why Groupon refused to pay a security researcher who discovered serious XSS bugs

It’s very common these days for tech companies Google and Microsoft to offer hackers and security researchers big bucks if they’re able to find security vulnerabilities that could pose serious threats to important software and services. Google in particular often hosts its own hacking competition where the search giant puts millions of dollars on the line for anyone savvy enough to skirt around Google’s built-in security schemes.

Recently, one security researcher found a number of high-level vulnerabilities on Groupon’s website. Groupon promptly patched the security holes but, as it turns out, is refusing to pay him.

Here’s why.

More →

No Comments
Public WiFi Safety Guide

How to use free public Wi-Fi without hackers stealing your data

By on April 23, 2015 at 12:25 PM.

How to use free public Wi-Fi without hackers stealing your data

Free public Wi-Fi hotspots are terrific. They offer users quick and reliable Internet connections where cellular reception is spotty. And even in areas with strong cellular signals, users can connect their phones, tablets and laptops to public Wi-Fi hotspots in order to conserve data on their mobile plans and steer clear of those pesky data caps.

Of course, there is one problem with public Wi-Fi networks, and it’s a big one: They’re completely open, which means any data you send or receive while connected to these networks is vulnerable and can easily be stolen by hackers. More →

No Comments
Samsung Galaxy S5 Fingerprint Scanner Hack

Scary Galaxy S5 scanner flaw will let hackers copy your fingerprints

By on April 22, 2015 at 8:15 PM.

Scary Galaxy S5 scanner flaw will let hackers copy your fingerprints

Well, let’s hope you never used the Galaxy S5’s fingerprint scanner. Forbes reports that researchers from security firm FireEye have found a scary flaw in the Galaxy S5’s fingerprint scanner that could let hackers copy your fingerprints and use them for nefarious purposes. More →

No Comments
iPhone Security Flaw

Security flaw lets attackers cripple your iPhone and there’s no way to stop them

By on April 22, 2015 at 11:46 AM.

Security flaw lets attackers cripple your iPhone and there’s no way to stop them

Wondering how difficult it is for attackers to cripple your iPhone? The answer isn’t going to make you happy — in a nutshell, all the have to do is create a Wi-Fi network. That’s right, thanks to a newly detailed security flaw in iOS, malicious hackers can send an iPhone into an endless reboot loop simply by creating a Wi-Fi network. And the worst part is that iPhones will connect to these networks automatically, and the only way to stop it is to disable Wi-Fi completely. More →

No Comments
OS X Yosemite Rootpipe Security Vulnerability

‘Rootpipe’ OS X Yosemite security vulnerability not as patched as initially believed

By on April 22, 2015 at 6:50 AM.

‘Rootpipe’ OS X Yosemite security vulnerability not as patched as initially believed

A “Rootpipe” backdoor in various Mac OS X versions, or a security flaw that could give hackers full access to a Mac without authentication, was supposedly patched by Apple in an OS X 10.10.3 update earlier that month. But it looks like the patch doesn’t quite fix the security flaw, The Hacker News reports, as Yosemite computers are still vulnerable to Rootpipe-based attacks. Furthermore, Macs running OS X 10.9 or later have not been patched, and it’s likely they won’t be. More →

No Comments
Snowden Password Tips: Pass-Phrases

Do this now: Set up all your passwords the Snowden way

By on April 21, 2015 at 1:12 PM.

Do this now: Set up all your passwords the Snowden way

A few weeks ago, Last Week Tonight’s John Oliver travelled all the way to Russia to interview Edward Snowden. Snowden, of course is responsible for numerous leaks that revealed the advanced surveillance operations intelligence agencies are capable of nowadays. The interview was particularly enjoyable thanks ti the fact that Oliver’s team was able to present serious matters in very entertaining ways. One of the gems in that episode is related to password security, PopularMechanics points out, with Snowden revealing one key tip that you absolutely should consider when setting up online passwords.

More →

No Comments
iPhone iOS App Encryption Security Issue

1,500 iPhone apps have a serious flaw that hackers can easily exploit

By on April 21, 2015 at 10:20 AM.

1,500 iPhone apps have a serious flaw that hackers can easily exploit

While security companies usually detail vulnerabilities in Android that hackers can use for malicious purposes, analytics service SourceDNA uncovered an encryption flaw that may affect as many as 1,500 applications, Ars Technica reports. Among them, you’ll find some popular titles, including Citrix OpenVoice Audio Conferencing, the Alibaba.com mobile app, Movies by Flixster with Rotten Tomatoes, KYBankAgent 3.0, and Revo Restaurant Point of Sale. More →

No Comments
iPhone Encryption Manhattan District Attorney

Manhattan DA makes the most over-the-top claim about iPhone encryption we’ve heard yet

By on April 20, 2015 at 6:40 PM.

Manhattan DA makes the most over-the-top claim about iPhone encryption we’ve heard yet

We’ve heard a lot of hysterical claims from law enforcement officials about all the awful things that will happen if Apple and Google encrypt their mobile operating systems, but this new piece of hyperbole from Manhattan’s district attorney may take the cake. More →

No Comments
In-Flight WiFi Cybersecurity Risk

Government watchdog says that in-flight WiFi could allow hackers to hijack planes

By on April 15, 2015 at 12:11 PM.

Government watchdog says that in-flight WiFi could allow hackers to hijack planes

In a report released earlier this week, U.S. government watchdog group GAO (Government Accountability Office) warned that the increasing connectivity of our aircraft, from flight tracking technologies to in-flight WiFi, could give hackers an access point to tap in and potentially hijack a flight. More →

No Comments