How to Hack an iPhone With a USB Charger

Monday, June 3rd, 2013

When it comes to threats to mobile devices, most people don't think of chargers as a likely point of attack. But plugging in an iPhone — or any smartphone or tablet — could come at a price. At next month's Black Hat security conference in Las Vegas, three Georgia Institute of ...

How to Secure USB Drives and Other Portable Storage Devices

Wednesday, May 29th, 2013

As individuals and organizations digitize more data, they become more susceptible to major data breaches. Though convenient, inexpensive USB flash memory sticks and other portable storage devices certainly don't help the cause, because workers use them transport databases and other confidential information. On top of the real danger of misused ...

New Malware Can Bypass BIOS Security

Saturday, May 25th, 2013

As more hardware vendors seek to implement the new NIST 800-155 specification that was designed to make the start-up BIOS firmware on our PCs and laptops more secure, they may need to rethink the security assumptions upon which the standard depends. A trio of researchers from The MITRE Corp. say ...

Twitter Gets Two-Factor Authentication

Wednesday, May 22nd, 2013

Today we’re introducing a new security feature to better protect your Twitter account: login verification. This is a form of two-factor authentication. When you sign in to twitter.com, there’s a second check to make sure it’s really you. You’ll be asked to register a verified phone number and a confirmed email address. To get started, ...

Why Email is a Key to Your Castle

Tuesday, May 21st, 2013

Having control over an email account can be a lot of power, even though most people would probably say they do not care if someone else is reading their private emails. But it’s not always about reading those private emails. Of course there have been quite a few attacks where ...