| Thursday April 24th 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘security’ Archives

Martha Hacks Her Ankle Monitor

Martha Hacks Her Ankle Monitor

Martha Stewart was in an interview with Vanity Fair when she made this remark. By merely saying this, I bet she violated some intellectual property law somewhere. Asked about the electronic monitoring device she must wear on her ankle — she has complained repeatedly that it irritates her skin — Stewart says she knows how to remove it.“I [...]

Easiest excuse for taking freedom: security

Easiest excuse for taking freedom: security

Here, in concise and precise language, is the best pricking of the security bubble I've seen... Security is an ideal language for suppressing rights because it combines a universality and neutrality in rhetoric with a particularity and partiality in practice. Security is a good that everyone needs, and, we assume, that everyone needs in the same [...]

Tool for finding out what information your apps are leaking

Tool for finding out what information your apps are leaking

mitmproxy, "an SSL-capable man-in-the-middle proxy," is a useful little free software utility that can sniff the traffic between your computer or mobile device and its servers and determine what data the apps you're running are leaking to the mothership. mitmproxy is an SSL-capable man-in-the-middle HTTP proxy. It provides a console interface [...]

How to Crack a Wi Fi Network’s WPA Password with Reaver

(more…)

Printer malware: Print a malicious document and expose your whole LAN

One of the most mind-blowing presentations at this year's Chaos Communications Congress (28C3) was Ang Cui's Print Me If You Dare, in which he explained how he reverse-engineered the firmware-update process for HPs hundreds of millions of printers. Cui discovered that he could load arbitrary software into any printer by embedding it in a malicious [...]

Facebook “flaw” lets anyone see your private photos

Facebook “flaw” lets anyone see your private photos

Features in Facebook give users access to personal, private and hidden photos that would normally be hidden from view. The flaw, spotted by members of a body building forum, no less, allows Facebook users to access photos revealed by the report abuse tool. This flaw appears to expose private photos of any person on Facebook. We tried this out for [...]

You say “rootkit,” I say “diagnostic tool”

You say “rootkit,” I say “diagnostic tool”

"The only way to remove Carrier IQ is with advanced skills," Eckhart wrote in a report, published on the Web on Monday. "If you choose to void your warranty and unlock your bootloader you can (mostly) remove Carrier IQ." The software, Carrier IQ, tracked the location of the phone, what keys were pressed, which Web pages were visited, when calls [...]

Hackers break SSL encryption

Hackers break SSL encryption

Researchers have discovered a serious weakness in virtually all websites protected by the secure sockets layer protocol that allows attackers to silently decrypt data that's passing between a webserver and an end-user browser. The vulnerability resides in versions 1.0 and earlier of TLS, or transport layer security, the successor to the secure [...]

Default password on hotel safe

The fellow in this video shows how he opened a safe by entering a default password of 000000.

Security researchers trace RSA hack and SecureID breach to lame Excel spreadsheet phishing

Security researchers trace RSA hack and SecureID breach to lame Excel spreadsheet phishing

F-Secure found the file that was used to hack RSA and compromise the SecureID system. Kim Zetter of Wired News has more here. This week Finnish security company F-Secure discovered that the file had been under their noses all along. Someone — the company assumes it was an employee of RSA or its parent firm, EMC — had uploaded the malware to [...]

BART police officers website hacked, database released

BART police officers website hacked, database released

Reports are circulating that databases containing BART police officer information from the website for The Bay Area Rapid Transit Police Officers' Association site have been published. The bartpoa.com site is currently down. Who is responsible for the hack? Whoever ends up claiming credit, it's complicated. What isn't complicated: the notion that [...]

Should you use public cell-phone charging kiosks?

Should you use public cell-phone charging kiosks?

Beware of Juice-Jacking, warns security researcher Brian Krebs. Those cell-phone charging kiosks in airports and other public places amount to an "unknown device that could be configured to read most of the data on your phone, and perhaps even upload malware." The answer, for most folks, is probably not. The few people I’ve asked while [...]

Stanford researcher exposes Microsoft’s Wi-Fi database

Stanford researcher exposes Microsoft’s Wi-Fi database

Stanford researcher exposes Microsoft's Wi-Fi database (type in your MAC address and see if it's in there)... A Stanford University researcher has created a Web page allowing people to query Microsoft's massive database for the locations of their--or someone else's--laptops, cell phones, and other Wi-Fi devices. The Web page, created this [...]

Anon hacks Monsanto and posts 2500 employee names and contact info

Anon hacks Monsanto and posts 2500 employee names and contact info

Normal crop rotation works like this; you plan something, it grows, you harvest and then re-seed using the seeds gathered in the harvest. Monsanto managed to patent the DNA of it's genetically modified seeds, any attempt to replant using the seeds you have results in being sued by Monsanto. How do they know you replanted using their seeds? They [...]

How not to design a CAPTCHA

How not to design a CAPTCHA

Unfortunately Sony missed the entire point of a CAPTCHA. Instead of using an obfuscated image which is difficult for computers to recognize the characters, they include the CAPTCHA's unobfuscated characters in HTML and use CSS and JavaScript to make the characters appear slightly distorted. While taking a Digital Image and Video Processing [...]

Hackers are being radicalised by government policy

Hackers are being radicalised by government policy

I took a class on terrorism in college in 1999. One thing I remember from our instructor, who wrote fiction for "Soldier of Fortune" under a pseudonym, was that one of the goals of terrorism is to make the target government crack down with so much oppressive behavior that life gets intolerable and the citizens rise up in a glorious workers' [...]

Most common iPhone unlock codes

Most common iPhone unlock codes

This chart shows the 10 most common iPhone numeric lock-codes, as anonymously gathered by the Big Brother Security Camera app (now removed from the App Store). They represent 15% of all 204,508 passcodes sampled. I wonder how strongly they correlate with other numeric PINs, such as ATM/Chip-and-PIN codes. Interestingly, 1990-2000 are all in [...]

Comparative analysis of leaked Sony and Gawker passwords

Comparative analysis of leaked Sony and Gawker passwords

While it's pretty awful that a million Sony users' passwords and 0.25 million Gawker passwords were published online, it has made for an interesting comparative analysis of the weaknesses in password protection, a subject near and dear to many security researchers' hearts. Troy Hunt has published one such analysis, and it's a fascinating [...]

Federal judge: Open WiFi doesn’t make you liable for your neighbors’ misdeeds

Federal judge: Open WiFi doesn’t make you liable for your neighbors’ misdeeds

A Federal judge in Illinois has once again rebuffed a copyright troll's request for easy court orders to allow him to connect IP addresses with people. The judge said that open wireless networks and other factors make the connection between IP addresses and defendants difficult, and that making it easy to connect people and IPs would invite [...]

PlayStation Network: hackers claim to have 2.2m credit cards

PlayStation Network: hackers claim to have 2.2m credit cards

COINCIDENCE? Come on Guardian. Don't lend credit to Sony's story that "Some credit card information may have possibly kind of been a little bit stolen/borrowed." Hackers in underground online forums are claiming to have access to credit card details stolen from Sony's PlayStation Network in mid-April, though security researchers say it is not [...]

 Page 1 of 14  1  2  3  4  5 » ...  Last »