Saturday, July 27th, 2013
The world lost a great hacker/security researcher on Thursday, just days before he was going to present his talk on hacking implantable medical devices. He stated it was possible to remotely control a pacemaker (aka kill someone) from 30 feet away and worked with the device manufacturers to secure the ...
Posted in Hardware, Internet, Security | No Comments
Thursday, July 25th, 2013
The ferocious nature of modern malware is wreaking havoc on some organizations, forcing security professionals to reassess current security policies and consider spending on modernizing defenses to detect attacks, according to a new survey.
The study, released this week by Enterprise Strategy Group and commissioned by Malwarebytes, surveyed 315 security professionals ...
Posted in Internet, Privacy, Security, Software | No Comments
Sunday, July 21st, 2013
Smartphones are susceptible to malware and carriers have enabled NSA snooping, but the prevailing wisdom has it there’s still one part of your mobile phone that remains safe and un-hackable: your SIM card.
Yet after three years of research, German cryptographer Karsten Nohl claims to have finally found encryption and software flaws that could affect millions of ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Sunday, July 21st, 2013
The Ubuntu forums are the latest to suffer a data breach, from a hacker, taking place last night. An estimated 1.82 million accounts have been affected and at the time of writing the site is still down for maintenance.
According to the placeholder page currently on the Ubuntu site, only the forums were ...
Posted in Internet, Linux, Privacy, Security | No Comments
Friday, July 19th, 2013
At the Black Hat conference in Las Vegas, researchers will reveal critical vulnerabilities in many of the world’s most widely-used building security systems and RFID‑based badging systems.
Bishop Fox Senior Security Analysts Drew Porter and Stephen Smith and Partner Fran Brown will be presenting two separate talks that showcase methods of ...
Posted in Hardware, Privacy, Security | No Comments