Cybersecurity

Who Has Your Back? Government Data Requests 2015 | Electronic Frontier Foundation

Who Has Your Back? 2015: Protecting Your Data From Government Requests report https://www.eff.org/who-has-your-back-government-data-requests-2015 We live digital lives—from the videos shared on social networks, to location-aware apps on mobile phones, to log-in data for connecting to our email, to our stored documents, to our search history. The personal, the profound, and even the absurd are all

Stagefright: Millions of Android devices at risk from new exploit (Wired UK)

Security researchers have successfully exploited the Android-based Stagefright bug and remotely hacked a phone, which may leave millions devices vulnerable to attack. Israeli software research company NorthBit claimed it had “properly” exploited the Android bug that was originally described as the “worst ever discovered”. http://www.wired.co.uk/news/archive/2016-03/16/stagefright-android-real-world-hack The exploitation, called Metaphor, is detailed in a research paper

5 Major Hospital Hacks: Horror Stories from the Cybersecurity Frontlines – IEEE Spectrum

5 Major Hospital Hacks: Horror Stories from the Cybersecurity Frontlines article tells that real-world war, combatants typically don’t attack hospitals. In the cyber realm, hackers have no such scruples. “We’re attacked about every 7 seconds, 24 hours a day” Many computers and medical devices in hospitals are running ancient operating systems that are full of security holes.

Darpa Invites Techies to Turn Off-the-Shelf Products Into Weapons in New ‘Improv’ Challenge – IEEE Spectrum

The good news is that some of today’s most advanced technologies are cheap and easy to find, both online and on the shelves of major chain stores. That’s also the bad news, according to DARPA. Darpa Invites Techies to Turn Off-the-Shelf Products Into Weapons in New ‘Improv’ Challenge article tells that defense agency is nervous

What ISPs Can See

What ISPs Can See: Clarifying the technical landscape of the broadband privacy debate https://www.teamupturn.com/reports/2016/what-isps-can-see Truly pervasive encryption on the Internet is still a long way off. The fraction of total Internet traffic that’s encrypted is a poor proxy for the privacy interests of a typical user. Even with HTTPS, ISPs can still see the domains

Click bait: Tor users can be tracked by mouse movements — RT Viral

The way you move your mouse is unique, like fingerprints, and can be used by dark forces to track you on supposedly anonymous and secure networks like Tor, according to a Barcelona researcher. Jose Carlos Norte discovered the snooping method in recent weeks: Using Javascript, a hacker could identify a user based on the movements in

Why Is the U.S. Determined to Have the Least-Secure Credit Cards in the World? – The Atlantic

For years, when it came to credit-card security, the United States was the last major holdout in the developed world, continuing to issue cards with magnetic stripes rather than the more-secure microchip EMV cards (EMV stands for the three companies that pioneered the chip: Europay, Mastercard, and Visa). http://www.theatlantic.com/business/archive/2016/03/us-determined-to-have-the-least-secure-credit-cards-in-the-world/473199/ Posted from WordPress for Android