With Black Hat 2014 in full swing in Las Vegas, it was never going to be a quiet week – but revelations about FBI malware and a trove of a billion passwords inspired furious debate too.
This week in security news saw the world’s researchers discover a whole new range of Achilles Heels for PCs, the online privacy service Tor, and even ‘connected’ gadgets such as internet fridges.
Facebook has faced repeated controversy over privacy, with features such as Graph Search revealing information which users might have forgotten they ever “shared”. But there are steps users can take to manage the way Facebook uses their information.
It is perfectly possible to “hack” a car while it is driving on the road, seize control, and force the vehicle into a fatal crash, says a car security specialist – saying that the 100-or-so computers in “connected” cars are vulnerable to attack.
One of the realities of news that happens at Internet-speed is that it may not be wholly accurate. Much of what has come out about the Target breach contains factual errors that may not seem obvious, especially as they are repeated by many news outlets. So let us take a moment to examine some of the more common myths that have been flying around.
The city of Chicago recently announced a change to the curriculum for schools in their district that would introduce children as young as primary school to computer science concepts. It would also allow students to count computer science as a core subject that fulfills graduation requirements. What does this say about the current state of computer-related education?
The Target security breach and the Snowden revelations about NSA surveillance have raised awareness of data privacy to new levels, making Data Privacy Day more relevant than ever in 2014. And yes, Data Privacy Day is a real thing, observed on January 28.
The 2014 threat trends report from ESET’s global network of cybersecurity experts centers on three key trends, the first and foremost being digital privacy, the others being threats to mobile devices, and new, hi-tech malware targeting PCs and other devices in the home.
Attacks which “hijack” calls and block phone services for individual phone users or even whole city areas are possible, using a “rogue device” to attack cellular networks, according to Berlin researchers.
“You expect to watch TV, but you don’t want the TV watching you,” said Senator Charles E Schumer, as he called for improved security measures in “Smart” televisions.
An Apple developer website was hacked last week, and has remained offline for days after an attack which Apple admits may have exposed, “names, mailing addresses, and email addresses.” A security researcher has claimed that the hack exposed up to 100,000 users’ details.
“Children are a formidable adversary – unlike any other,” says Microsoft security researcher Stuart Schechter, in a paper to be presented at the SOUPS security conference next week.
More people will be enjoying more digital devices on holiday trips this year than ever before, so we’ve rounded up the top tips for protecting your technology on the road, so you can enjoy a safer, less stressful vacation.
Blizzard, makers of the hit online game World of Warcraft, issued a security alert today after a spate of unauthorized logins and player reports of “money laundering” scams.
Facebook has admitted to a security breach which exposed details such as emails and phone numbers for six million site users.
Many companies are unprepared for data breaches and hacking incidents – and the percentage of companies without any form of crisis response plan has actually grown in the past year, says consulting firm Protiviti.
Yahoo defended its plan to recycle inactive user IDs this week, saying that it had put in place safeguards to prevent the recycled usernames being used for identity theft.
A simulated cyber attack with the Hollywood-esque title Quantum Dawn 2 will bombard the defenses of American banks on June 28 – in an exercise designed to test how Wall Street would endure a sustained hi-tech assault.
Hackers could remotely attack security cameras commonly used in banks and prisons – and either spy on secure facilities or replace “real” video feeds with fakes, according to a U.S. security expert.