Police Spy Car Google Maps

Police can’t explain why their spy SUV was disguised as a Google truck

By on May 13, 2016 at 10:36 AM.

Police can’t explain why their spy SUV was disguised as a Google truck

An image emerged online earlier this week showing a parked SUV that looked nothing like a Google Streetview car, even though it had a Google Maps sticker on it. Discovered hiding in “the shadows” of the Philadelphia Convention Center, the car had two license plate readers on the front. Unsuspecting people who have never seen a Google Streetview car might confuse the spy SUV for an actual Google Maps car. But savvy internet users who can tell the difference knew better than that, realizing this was likely a law enforcement car disguised in a most unexpected way.

Soon enough, police confirmed the SUV belonged to its fleet. But authorities also denied any involvement in adorning the car with a Google Maps decal. That’s hilarious, stupid and scary, all at the same time. More →

No Comments
Tech Scammers

Scammers are using fake tech support pages to steal thousands from unsuspecting users

By on May 10, 2016 at 3:26 PM.

Scammers are using fake tech support pages to steal thousands from unsuspecting users

While most topics in the tech world tend to engender impassioned debate, there’s one issue that everyone can unanimously agree on: tech scammers who prey on and take advantage of unsuspecting Internet users are the scourge of the earth. And while most people are familiar with scams that rely upon adware or ransomware, scammers have recently started using a new strategy that’s as clever as it is loathsome.

According to Malwarebytes Labs, a group of scammers who call themselves ‘Tech Kangroos’ have started putting up tech support webpages designed to look nearly identical to webpages from known software companies. In turn, when unsuspecting users undertake to seek out tech support help via search engines like Google or Bing, they’re naturally tricked into clicking on fraudulent websites. In short order, users are coerced and manipulated into paying hundreds of dollars for non-existent tech support.

More →

No Comments
Password Strength Online Tool

Online tool tells you how strong your email and Facebook passwords are

By on May 6, 2016 at 5:35 PM.

Online tool tells you how strong your email and Facebook passwords are

It’ll take hackers just 0.29 seconds to crack into your email or Facebook account if you use “password” or “12345” as your password. Seriously, it’s time to choose better passwords for your online accounts — and make sure they’re unique, too. If you’re not sure about how to go about setting up better passwords, there’s an online tool that will tell you how quickly hackers can break them using today’s tech.

More →

No Comments
LAPD iPhone 5s Unlock

LAPD can also unlock iPhones without Apple’s help

By on May 5, 2016 at 7:15 AM.

LAPD can also unlock iPhones without Apple’s help

It’s not just the FBI that has the technical ability to unlock password-protected iPhones without triggering kill-switch mechanisms – all without any help from Apple. LAPD can also hack into certain iPhones. The FBI cracked the San Bernardino iPhone 5c, and the LAPD hacked an iPhone 5s belonging to the wife of The Shield actor Michael Jace. In both cases, expertise from forensic experts was used. More →

No Comments
Mail.ru, Gmail, Yahoo, Microsoft Email Heist

Over 272 million email accounts stolen from Gmail, Microsoft, Yahoo and more

By on May 4, 2016 at 12:10 PM.

Over 272 million email accounts stolen from Gmail, Microsoft, Yahoo and more

A new report shows that hackers from Russia have obtained login credentials for more than 272.3 million email accounts, which are now available for sale in Russia’s criminal underworld, a Most of them are Mail.ru accounts, though the list also includes smaller fractions of Google, Yahoo, and Microsoft email users. More →

No Comments
Hackers RFID Badge Security

Hackers can break into your company using $700 worth of parts from Amazon and eBay

By on May 2, 2016 at 5:01 PM.

Hackers can break into your company using $700 worth of parts from Amazon and eBay

Hackers looking to break into companies could do so with the help of a $350 device that can be purchased online from Amazon or eBay, new research shows. By taking advantage of the way most employee ID badges work, hackers could simply manufacture counterfeit access cards that would work just like the original badges. More →

No Comments
NSA Spying American Citizens

The NSA doesn’t even know how many Americans it’s spying on

By on April 29, 2016 at 1:50 PM.

The NSA doesn’t even know how many Americans it’s spying on

The National Security Agency (NSA), which is behind some of the world’s most sophisticated mass surveillance operations, can’t say how many Americans it’s spying on in these endeavors. That’s not because it’s a secret, though that might be a reason too. It’s because the agency’s operations are so vast that it can’t even figure out the number. More →

No Comments
Featured
Ted Lieu Interview

Meet Rep. Ted Lieu, a Congressman who says encryption is a ‘national security priority’

Meet Rep. Ted Lieu, a Congressman who says encryption is a ‘national security priority’

By on April 29, 2016 at 12:27 PM.

Ted Lieu is one of the few bona fide computer geeks in Congress. Even if you didn’t already know the California Democrat is one of only four congressmen (out of a total of 535) with a computer science degree, it’s the kind of thing that quickly becomes apparent when talking to the Stanford grad about a range of privacy and encryption matters.

For starters, he recently downloaded and started using WhatsApp, the Facebook-owned messaging platform that earlier this month defaulted to end-to-end encryption for all users. He’s not only a supporter of strong encryption without backdoors — Lieu considers it “a national security priority.” More →

No Comments
FBI San Bernardino iPhone 5c Unlock

FBI director doesn’t even know who created the $1M iPhone-hacking device

By on April 29, 2016 at 7:15 AM.

FBI director doesn’t even know who created the $1M iPhone-hacking device

More details have emerged in the San Bernardino shooting investigation. The FBI has arrested three suspects on Thursday, though it’s not clear whether that move is connected in any way with any of the scant evidence it may have discovered on the iPhone 5c belonging to one of the shooters. However, a new report also sheds more details about the hack the feds bought to crack open the device.

Apparently, there’s a physical gadget used to unlock any iPhone 5c running iOS 9, but the FBI has no idea how it works. That’s even if it paid up to $1 million for the tool. More →

No Comments
ISIS United Cyber Caliphate Hackers

ISIS is assembling a cyber army

By on April 28, 2016 at 4:02 PM.

ISIS is assembling a cyber army

Following the deadly assaults on Europe in late 2015 and early 2016, reports emerged suggesting that ISIS has an army of organized hackers who can provide consistent, round the clock support to foot soldiers. However, new information on the matter seems to suggest that ISIS’s remaining hacking arm is nothing more than a propaganda machine capable of dealing minor hits, if any, to enemies. But ISIS is showing more interest in expanding its hacking capabilities.

The news comes at a time when the U.S. government has declared cyber war on the Islamic paramilitary organization.

More →

No Comments
FBI San Bernardino iPhone Hack Apple

FBI will tell Apple how it hacked the San Bernardino iPhone… after Apple patches it

By on April 27, 2016 at 7:15 AM.

FBI will tell Apple how it hacked the San Bernardino iPhone… after Apple patches it

The FBI challenged Apple in courts twice in the last few months, asking the iPhone maker to unlock devices. And twice, the Feds had to drop their cases, after finding ways to break into the iPhones. One of the two handsets belonged to the San Bernardino shooters, and the FBI unlocked that one with help from outside experts. Reports suggest the FBI may have paid well over $1.3 million for the vulnerability. But the Bureau said the security flaw doesn’t work on all iPhones, only on the iPhone 5c that belonged to one of the shooters – it didn’t use the same hack on the other iPhone it wanted Apple to unlock.

Even so, the FBI isn’t likely to share with Apple the vulnerability, a new report reveals. It’s more likely that Apple finds it and patches it before the Bureau steps up. More →

No Comments
Android Ransomware Cyber Police iTunes

Creepy new Android ransomware installs itself, demands payment in iTunes gift cards

By on April 26, 2016 at 7:15 AM.

Creepy new Android ransomware installs itself, demands payment in iTunes gift cards

This brand new Android threat might not affect a large number of users, but it deserves some attention considering its ingenuity. Unlike other malware threats that need to fool the user to install them, this new ransomware-like attack does it automatically, without the owner of the handset knowing what’s happening. Ironically, after locking down the handset, the program demands payment in iTunes gift cards. But thankfully, there is a way to deal with it. More →

No Comments