-
April 1, 2014
Researcher lights fire under Tesla security
Researcher lights fire under Tesla security: A security researcher is calling on Tesla to introduce two-factor authentication for access to the combination of services that make its Tesla S model one of the most “Internet of Things” vehicles in the world today. As noted by Threatpost, researcher Nitesh Dhanjani has found that the combination of […]
-
April 1, 2014
Social Engineering and Online Dating
Social Engineering and Online Dating: I have blogged on the topic of online dating in the past, and how it’s not much different than phishing and other forms of online fraud. While it was meant to mock my personal experiences of dating in the 21st century, identity theft is no laughing matter. In the last […]
-
April 1, 2014
NSA infiltrated RSA security more deeply than thought
NSA infiltrated RSA security more deeply than thought: Security industry pioneer RSA adopted not just one but two encryption tools developed by the U.S. National Security Agency, greatly increasing the spy agency’s ability to eavesdrop on some Internet communications, according to a team of academic researchers. Reuters reported in December that the NSA had paid […]
-
April 1, 2014
Breaking through the firewall between Security and Privacy: Canadian Anti
Breaking through the firewall between Security and Privacy: Canadian Anti: On July 1 2014 the new Canadian Anti-Spam legislation CASL will begin to be enforcedfirst of three phases. Why should I care if I live outside Canada, or what does it mean if I am a Canadian Business, or should I care if I am […]
-
January 24, 2014
How to Stop Web Sites from Potentially Listening to Your Microphone
How to Stop Web Sites from Potentially Listening to Your Microphone: Heres the lowdown. Once you give a site permission to use your microphone or camera, Chrome assumes that site will have permission to do so in the future. That means every instance of that site, every page on that site, also has access to […]
-
December 22, 2013
The value of stolen card data that includes localization info
The value of stolen card data that includes localization info: The hackers behind Target data breach are selling stolen card data including localization info. Why?In numerous posts I have highlighted the possibility to acquire stolen card data on the black market, different website on the underground and within the Deep Web proposed the precious commodities […]
-
December 21, 2013
Facebook accused of mining private messages
Facebook accused of mining private messages: Facebook is facing a class-action lawsuit in the US which alleges the company mines data from private messages without users’ knowledge or consent, and shares the information with advertisers. The lawsuit by two US users accuses Facebook of violating the Electronic Communications Privacy Act and California privacy laws by […]
-
December 20, 2013
Snapchat To Update App In Wake Of Breach
Snapchat To Update App In Wake Of Breach: Snapchat, a mobile photo-messaging app created for wiping out traces of the messages for privacy reasons, this week was hit with a major breach of its users privacy that exposed names and phone numbers of some 4.6 million of its customers. The data dump came after security […]
-
December 19, 2013
Drugmakers urge FDA security audit after cyber breach
Drugmakers urge FDA security audit after cyber breach: BOSTON (Reuters) – The U.S. Food and Drug Administration is under pressure from the pharmaceutical industry and lawmakers to undergo an independent security audit, after hackers broke into a computer system used by healthcare companies to submit information to the agency. Drug companies fear the cyber thieves […]
-
December 17, 2013
Apple approves homosexual meetup app for users as young as 12
Apple approves homosexual meetup app for users as young as 12: CUPERTINO, CA, December 16, 2013 (LifeSiteNews.com) – “If you’re gay and new to an area, how do you find out where gay people hang out?” That, according to the creators of a newly-approved app for Apple’s iOS-based phones and tablets, is the “overly simplistic […]