John McAfee Fox News Hack

Watch John McAfee hack a Fox News host’s phone live on air

By on January 14, 2015 at 1:55 PM.

Watch John McAfee hack a Fox News host’s phone live on air

Despite countless reports, investigations and press conferences over the past several weeks, there is still a shroud of mystery surrounding the Sony Pictures hack. We might never know all of the details, but one well-known, eccentric programmer thinks he knows exactly how the hack was initiated — and it’s much simpler than you might have imagined. More →

No Comments
Android 4.3 WebView Security Issues

Google won’t fix a security issue that affects 1 billion Android devices

By on January 14, 2015 at 7:45 AM.

Google won’t fix a security issue that affects 1 billion Android devices

Whenever asked about security and malware in Android, Google always explains how it keeps updating the security of its mobile operating system to make sure users are safe, while simultaneously minimizing the risks. Even so, millions of Android users are affected by malware, and security researchers have just discovered a serious issue that might affect as many as 1 billion devices — and Google isn’t willing to fix it. Or at least, not by itself. More →

No Comments
Featured
How To Set Up A VPN

How to set up a VPN – and why you should, if you care about privacy

How to set up a VPN – and why you should, if you care about privacy

By on January 13, 2015 at 8:00 PM.

If we learned anything in 2014, it’s the simple but painful truth that here in the digital age, we are not safe. Nefarious hackers are lurking around every virtual corner of the Internet, constantly developing new ways to attack us and steal our private data. Many times, these hackers target the large companies that store our data and as troubling as it is, there is simply nothing we can do to safeguard information that is held by third parties. Instead, we must rely on these companies to take the necessary measures to protect our data.

When it comes to our own data and our personal browsing habits, there are measures we all can and should take to protect ourselves. More →

No Comments
David Cameron Encryption Ban

The 4 funniest British responses to David Cameron’s boneheaded attack on encryption

By on January 13, 2015 at 2:10 PM.

The 4 funniest British responses to David Cameron’s boneheaded attack on encryption

If there’s one thing British writers do vastly better than we Americans, it’s using subtle but cutting wit to ridicule others’ complete stupidity. Now the United Kingdom’s own prime minister David Cameron has given them quite an opportunity to use their talents after he said he wanted to prevent mobile apps such as WhatsApp from using encryption that would potentially block intelligence agencies from being able to read everyone’s messages. Thankfully, our friends across the pond haven’t let us down — below we’ve found you the four funniest British responses to Cameron’s attack on encryption. More →

No Comments
New iCloud Hacking Tool

Hackers claim they’ve found a frighteningly easy way to hack your iCloud account

By on January 2, 2015 at 10:40 AM.

Hackers claim they’ve found a frighteningly easy way to hack your iCloud account

One of the most infamous Internet events of 2014 might be doomed to repeat itself. Business Insider reports that a hacker known as Pr0x13 has released a tool called iDict on GitHub that is capable of bypassing restrictions and authentication on any iCloud account, potentially giving hackers unfettered access to iOS devices. More →

No Comments
PSN Xbox Live Hack

One of the hackers allegedly behind the PSN and Xbox Live attacks has been arrested

By on January 1, 2015 at 9:44 AM.

One of the hackers allegedly behind the PSN and Xbox Live attacks has been arrested

For millions of gamers around the world, Christmas was ruined last week when hackers from a group called “Lizard Squad” crippled the online gaming networks tied to Xbox and PlayStation consoles. The attacks rendered the PlayStation Network and Xbox Live completely unusable by hammering them with Internet traffic in an attack called a distributed denial of service (DDoS) attack.

The hackers behind the attacks bragged about them online and even on the news, but all of that arrogance may have come at a price for at least one alleged Lizard Squad member, who has reportedly been arrested. More →

No Comments
Sony Hack BlackBerry Devices

A surprising winner emerges from the Sony hack: BlackBerry

By on December 31, 2014 at 4:35 PM.

A surprising winner emerges from the Sony hack: BlackBerry

There aren’t many winners in the Sony hack but one of them might be BlackBerry. The New York Times reports that once Sony realized the massive scope of the hack, it was forced to dig up “a handful of old BlackBerrys, located in a storage room in the Thalberg basement” and give them to key executives. The reason Sony did this is because BlackBerry still has an unmatched reputation for security and their devices were the only way Sony could be sure their high-level executives’ communications remained confidential. More →

No Comments
PSN and Sony Pictures Hack

New reports reveal a possible link between the PSN and Sony Pictures hacks

By on December 30, 2014 at 6:15 PM.

New reports reveal a possible link between the PSN and Sony Pictures hacks

Sony has been hit by two different hacker groups in a month, as Guardians of Peace (GOP) and Lizard Squad have targeted Sony Pictures and PSN, respectively. Of the two attacks, the former was more disastrous for Sony, as hackers managed to steal a massive amount of personal and business-related information, and convince Sony to briefly cancel the release of The Interview, a controversial comedy about the assassination of North Korean leader Kim Jong Un. More →

No Comments
NSA-proof Encryption Services

These are the encryption services the NSA can’t crack

By on December 29, 2014 at 4:45 PM.

These are the encryption services the NSA can’t crack

The ripples from the massive National Security Agency leak orchestrated by former contract worker Edward Snowden continue to be felt even now. While most of the eye-opening revelations are behind us, the sheer volume of confidential documents exposed by Snowden has resulted in a continued trickle of information. Now, a new report covering information pulled from leaked NSA documents reveals several encrypted services that the NSA has been able to crack in its widespread data collection efforts.

More importantly, perhaps, the report identifies a number of secure services with encryption that the NSA has been unable to crack. More →

No Comments
Hackers: Fingerprint Stolen From Photos

Hackers have found an insanely easy way to steal your fingerprints

By on December 29, 2014 at 1:50 PM.

Hackers have found an insanely easy way to steal your fingerprints

Apple and Samsung have already launched smartphones that pack special fingerprint sensors that can be used for authentication purposes, and some hackers have already proved they can be beaten using fake fingerprints. In addition to mobile devices, there are plenty of other locked devices that can be unlocked using fingerprints and that hackers are also eager to crack. VentureBeat reports that hackers have devised a new way of stealing someone’s fingerprints using only a regular camera that doesn’t require having access to someone’s actual physical fingerprints. More →

No Comments
Sony Hackers Identity Speculation

This may be the best evidence yet that the Sony hack was an inside job

By on December 29, 2014 at 1:05 PM.

This may be the best evidence yet that the Sony hack was an inside job

Was the North Korean government really the mastermind behind the massive hack on Sony? Many researchers have continued to express skepticism about this claim and The Security Ledger reports that researchers at security firm Norse may have uncovered the best evidence yet that the Sony hack was actually an inside job. More →

No Comments