Wednesday, June 18th, 2014
Ever since I learned about the threat of “juice-jacking” — the possibility that plugging your mobile device into a random power charging station using a USB cord could jeopardize the data on that device — I’ve been more mindful about bringing a proper power-outlet charging adapter on my travels. But in the ...
Posted in Hardware, Mobile, Privacy, Security | No Comments
Wednesday, May 7th, 2014
Researchers have uncovered Android-based malware that disables infected handsets until end users pay a hefty cash payment to settle trumped-up criminal charges involving the viewing of illegal pornography.
To stoke maximum fear, Android-Trojan.Koler.A uses geolocation functions to tailor the warnings to whatever country a victim happens to reside in. The screenshot ...
Posted in Hardware, Internet, Mobile, Security | No Comments
Tuesday, April 15th, 2014
LaCie is the latest major retailer and tech company finding itself to be the target of a major security breach by unknown assailants.
The French hardware company confirmed in a statement on Tuesday that malware successfully made its way through to access sensitive customer information stemming from transactions on its website.
Here's where things ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Thursday, April 3rd, 2014
Tens of millions of the home routers we rely on everyday for internet access are enabling Domain Name System (DNS) based distributed denial-of-service (DDoS) attacks, and owners may never even know it, according to research by DNS software provider Nominum.
Working collaboratively with the Open Resolver Project, Nominum learned that open ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Friday, February 21st, 2014
Tripwire has analyzed the security provided by the most popular wireless routers used in many small and home offices and found that 80 percent of Amazon’s top 25 best-selling SOHO wireless router models have security vulnerabilities.
Of these vulnerable models, 34 percent have publicly documented exploits that make it relatively simple ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments