Thursday, July 27, 2017

SECURITY

SECURITY

by Evann Gastaldo (courtesy Newser) Don't like the idea of the NSA spying on your phone calls and emails? In the Washington Post, Timothy B. Lee offers five ways for you to protect yourself: Tor: This Internet browser lets you...
video

The 1.4 million vehicle Fiat/Chrysler recall began after a Wired Magazine article. Then Twitter Engineer Charlie Miller and IOActive Director of Vehicle Security Research Chris Valasek exposed a Jeep's security vulnerability, all on video:...

NSA Leaker Located. National Security Agency leaker Eric Snowden remains at a Moscow's Sheremetyevo Airport, this according to Russia's President Vladimir Putin,  "...he has not commited any crimes in Russia."   After scouring the internet for additional information and updates as...

Dear John Q. Public: Below you will find an email exchange that will help to understand that nothing we say or do is private, Big Brother is like a friend watching us for our own...

By Marjorie Censer, courtesy WashingtonPost.com New disclosures about the National Security Agency’s surveillance efforts have given a boost to at least one Washington area company seeking to thwart prying eyes. Silent Circle, a National Harbor-based start-up...
Ransomware

Ransomware – malicious software that sneaks onto your computer, encrypts your data so you can’t access it and demands payment for unlocking the information – has become an emerging cyberthreat. Several reports in the...

by Dan Goodin (courtesy ArsTechnica) A vast array of heart defibrillators, drug infusion pumps, and other medical devices contain backdoors that make them vulnerable to potentially life-threatening hacks, federal officials have...

One of the oddities of the whole Ed Snowden affair has been all the talk of how some people are absolutely positive that officials in both China and Russia have copies of all the documents...

TINKERS ARE AUTOMATING ALL THE OTHER PROFESSIONS. WELL, ENGINEERS ARE ANYWAY. DARPA announced in 2012 its goal to create garments employing “zero direct labor.” Scratch the tailors. The rise of the autonomous military robot is...
ipohne unlocked

The Justice Department has managed to unlock an iPhone 5c used by the gunman Syed Rizwan Farook, who with his wife killed 14 people in San Bernardino, California, last December. The high-profile case has...

U.S. feared use of PCs built by Lenovo posed security threat long before spying concerns over Huaweii and ZTE surfaced. - by Mathew J. Schwartz, courtesy informationweek - Since at least 2006, personal computers manufactured by Lenovo...

Firmware is often a tricky topic for service providers, but I’ve found there’s one major issue that keeps up with mid-to-large sized operators — and it doesn’t have an easy solution. How can you...