| Friday October 24th 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

Posts Tagged ‘security’

Woman accused of groping TSA agent

Woman accused of groping TSA agent

A lot of people get peeved about TSA pat downs. But a Bonita Springs woman is accused of groping an agent at Southwest Florida International Airport and it's all on tape! It happened on her way to Cleveland, Ohio. Airline passenger Carol Price says while going through security to catch her flight, a TSA agent groped her. In response, the [...]

Shoes-on flight in sight

Shoes-on flight in sight

Air travelers will eventually be able to keep their shoes on to pass through security, but the restrictions on carrying liquids on board are likely to remain in place for some time, Homeland Security Secretary Janet Napolitano told a POLITICO Playbook breakfast Tuesday. "We are moving towards an intelligence and risk-based approach to how we [...]

Should you use public cell-phone charging kiosks?

Should you use public cell-phone charging kiosks?

Beware of Juice-Jacking, warns security researcher Brian Krebs. Those cell-phone charging kiosks in airports and other public places amount to an "unknown device that could be configured to read most of the data on your phone, and perhaps even upload malware." The answer, for most folks, is probably not. The few people I’ve asked while [...]

Lockdown High: how schools put the emphasis on crime, security and violence instead of freedom and education

Lockdown High: how schools put the emphasis on crime, security and violence instead of freedom and education

The Guardian's John Harris reviews Annette Fuentes's Lockdown High: When the Schoolhouse Becomes a Jailhouse, an investigative book on how "zero tolerance" policies have produced high-schools that "reflect a society that has become fixated on crime, security and violence." Harris points out that the insanity isn't a mere American phenomenon, [...]

Comparative analysis of leaked Sony and Gawker passwords

Comparative analysis of leaked Sony and Gawker passwords

While it's pretty awful that a million Sony users' passwords and 0.25 million Gawker passwords were published online, it has made for an interesting comparative analysis of the weaknesses in password protection, a subject near and dear to many security researchers' hearts. Troy Hunt has published one such analysis, and it's a fascinating [...]

Fraunhofer cracks iPhone password in 6 minutes, exposes stored passwords

"What’s the one thing that could make losing your iPhone worse? If the person who happens to find your AWOL iPhone knows exactly what they’re doing. In a two-minute video clip published by German engineering firm Fraunhofer, the company demonstrates how an iPhone’s password security can be rendered completely moot. The demonstration [...]

Google bets $20K that Chrome can’t be hacked

Google bets $20K that Chrome can’t be hacked

It's not $20k to bet against themselves, it's $20k paid for keen hackers to fix their browser's security further with PR to fuel the fire of interest. Google will pay $20,000 to the first researcher who successfully exploits its Chrome browser at this year's Pwn2Own hacking contest. The award is the largest ever for the annual challenge, [...]

Would-Be Suicide Bomber Killed by Unexpected SMS Spam From Mobile Carrier

Would-Be Suicide Bomber Killed by Unexpected SMS Spam From Mobile Carrier

Most useful spam sms of all time, amirite? A "Black Widow" suicide bomber planned a terrorist attack in central Moscow on New Year's Eve but was killed when an unexpected text message set off her bomb too early, according to Russian security sources. The unnamed woman, who is thought to be part of the same group that struck Moscow's Domodedovo [...]

10 Cool Nmap Tricks and Techniques

10 Cool Nmap Tricks and Techniques

Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. In addition to my list you can also check out this [...]

Stripper in Oklahoma City Airport Security

She sure moves unnaturally. The small side to side head movements are creepy.

Japanese TV mocks TSA security

Botmasters include fake control interface to ensnare security researchers

Botmasters include fake control interface to ensnare security researchers

Security researchers compromised what they believed to be a control server for the Zeus botnet, but after examining it in detail, they concluded that it was a fake, designed to allow botmasters to spy on security researcher tactics and plan countermeasures. What particularly stands out about the EFTPS exploit toolkit is their admin interface. [...]

US President Obama just booked all 570 rooms at the Taj Mahal hotel

US President Obama just booked all 570 rooms at the Taj Mahal hotel

Your tax dollars at work. To ensure fool-proof security, the President’s team has booked the entire the Taj Mahal Hotel, including 570 rooms, all banquets and restaurants. Since his security contingent and staff will comprise a huge number, 125 rooms at Taj President have also been booked, apart from 80 to 90 rooms each in Grand Hyatt and The [...]

Adobe issues security advisory for Flash Player, plans fix “during the week of September 27″

Adobe issues security advisory for Flash Player, plans fix “during the week of September 27″

Adobe has issued a security advisory for "Flash Player 10.1.82.76 and earlier versions for Windows, Macintosh, Linux, Solaris, and Adobe Flash Player 10.1.92.10 for Android, which also affects Adobe Reader 9.3.4 for Windows, Macintosh and UNIX, and Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh." The vulnerability can [...]