-
September 9, 2013
Spy Service Exposes Nigerian ‘Yahoo Boys’
Spy Service Exposes Nigerian ‘Yahoo Boys’: A crude but effective online service that lets users deploy keystroke logging malware and then view the stolen data remotely was hacked recently. The information leaked from that service has revealed a network of several thousand Nigerian email scammers and offers a fascinating glimpse into an entire underground economy […]
-
September 9, 2013
Bitcoin ATMs coming to Canada this fall
Bitcoin ATMs coming to Canada this fall: The first time Ryan Johnson bought Bitcoins — an emerging digital currency that isn’t controlled by any authority such as a central bank — was with a pocket full of cash from a stranger he had met online. “It was almost like a sketchy drug deal,” recalls the […]
-
September 8, 2013
Facebook to Pay Users $20 Million for Sharing Personal Data in Ads
Facebook to Pay Users $20 Million for Sharing Personal Data in Ads: The ads, which were posted on both the right-hand side of the site and in news feeds, used member names, pictures and details about the brands and interests they Like on the site. Members whose details appeared in the ads will now receive […]
-
September 8, 2013
Majority of Tor crypto keys could be broken by NSA, researcher says
Majority of Tor crypto keys could be broken by NSA, researcher says: The majority of devices connected to the Tor privacy service may be using encryption keys that can be broken by the National Security Agency, a security researcher has speculated. Rob Graham, CEO of penetration testing firm Errata Security, arrived at that conclusion by […]
-
September 8, 2013
Legislation Seeks to Bar N.S.A. Tactic in Encryption
Legislation Seeks to Bar N.S.A. Tactic in Encryption: Representative Rush D. Holt, a New Jersey Democrat who is also a physicist, said Friday that he believed the N.S.A. was overreaching and could hurt American interests, including the reputations of American companies whose products the agency may have altered or influenced. “We pay them to spy,” […]
-
September 8, 2013
After NSA encryption
After NSA encryption: News that the NSA can break or bypass a variety of digital encryption tools has researchers second-guessing the strength of Internet security products they previously trusted, and wondering exactly who else, besides the feds, may be listening in. In the latest revelation about the NSA’s activities, The Guardian, the New York Times, and […]
-
September 8, 2013
Dear stupid, stupid NSA
Dear stupid, stupid NSA: Dear stupid, stupid NSA, I’ve got to hand it to you: as an agency set up with the task of breaking codes and spying on people, you seem to be doing a pretty sterling job. You and your counterparts in the UK, Australia, Canada and New Zealand (and possibly elsewhere) are […]
-
September 8, 2013
DEA Has Access to Billions of AT&T Phone Call Records
DEA Has Access to Billions of AT&T Phone Call Records: The United States Drug Enforcement Agency’s (DEA) efforts to stay ahead of drug dealers has, according to a New York Times report, helped launch one of the most unusual and wide-ranging phone-record access programs seen yet. According to a report in the Sunday Times, the […]
-
September 8, 2013
Security Firm Bit9 Hacked, Used to Spread Malware
Security Firm Bit9 Hacked, Used to Spread Malware: Bit9 told a source for KrebsOnSecurity that their corporate networks had been breached by a cyberattack. According to the source, Bit9 said they’d received reports that some customers had discovered malware inside of their own Bit9-protected networks, malware that was digitally signed by Bit9′s own encryption keys. […]
-
September 7, 2013
What Every CFO Should Know About Security Breaches
What Every CFO Should Know About Security Breaches: “The Ponemon Institute estimates that the cost of the average data breach — the average, mind you — is over $5 million,” said Len Moodispaw, CEO of KEYW, a consulting firm that focuses on cybersecurity and counter-terrorism defense. “What that says is that it pays to make […]