When was the last time you saw a good documentary about the origins of computer hacking? Well, Code 2600, a new documentary film from a young filmmaker named Jeremy Zerechak comes really close to being both accurate and entertaining while at the same time scaring the pants off anyone who doesn't yet know that computer data is eternal and can be stolen by the wrong people if we're not careful. So it is fitting that the documentary, which is only available in limited release right now, will be shown next Friday at DefCon, the world's largest hacker conference and this year also celebrating its 20th anniversary.Read More >
For over a decade, Nortel Networks Ltd. was compromised by individuals using a Chinese IP address. With just seven passwords, copies of business plans, reports and emails wound their way overseas. Now the concern is that the malware used to access the company's secrets may have spread to other players in the telecommunications industry.Read More >
German researchers recently discovered how easy it is for someone to jailbreak your iPhone and reveal your passwords in six minutes. This type of hack doesn’t require the use of the phone’s passcode, mainly because the cryptographic key on current iOS devices operates independently from it.
The attack works based on existing vulnerabilities on Apple’s iPhone that enable access to the operating file system. Many of the passwords available to the attacker range from Google or Microsoft Exchange email accounts to VPN and WiFi access and more.Read More >
For the years to come, security of the smart device economy will become a vital topic for consumers and the device manufacturers. While right now, security may not be on everyone's minds, the issue of data thieves and hackers is growing in the smart device marketplace.Read More >
A North Carolina University researcher warns consumers that the Google Android 2.3 mobile device software has a major security flaw, which could enable hackers to access their personal information via the microSD card. Released just in December, the latest release of Android Gingerbread introduced several new improvements (one of which supposedly addressed its microSD vulnerability issue). However, Android Gingerbread isn’t perfect.
AOL Engadget warns readers that,Read More >
According to recent research, there are many common office devices that are major hacking targets. In the past decade, printers have become more high-tech with Web, email, and WiFi capabilities, without the security to protect them from unwanted attacks. According to the Technology Review,Read More >
What is the security gadget that UK bankers don’t want you to know about? A University of Cambridge student has published a paper on a new device that can protect card-holding consumers from the dangers of hackers, resulting in a financial trade group demanding that it be removed from the public.
According to Ars Technica, increasingly more people are learning about the vulnerability of their bank card system (Europay, MasterCard and Visa cards commonly used in the U.K.), and the protocol flaw that enables a hacker to use someone’s real card without knowing the PIN. Even worse, fraudsters can tinker with Chip-and-PIN card terminals in order to obtain sensitive data.Read More >
An article by io9 (Gawker Media) provides an insider glimpse from the 2011 Chaos Communication Congress in Berlin, which headlined a variety of international hackers, scientists, and high-tech gurus who demonstrated how easy it is to break into an individual’s computer, phone, bank card, and more.
Are PDFs no longer safe? The PDF file is one of the most commonplace formats today, but is one of the easiest to break. In fact, the PDF format is so insecure that a hacker can embed a program inside of it, which you would never be able to see, and enable it to attack your computer.Read More >
GM is planning on giving each new Chevy Volt sold its own IP address. This is creating concern among experts that hackers will be able to take control of cars. Security measures are in place to prevent this from occurring, but it is unlikely to dissuade the most serious hackers, who may be willing to hack deeply enough to do damage.Read More >
A recent post on the Managing Automation blog looks at new cyber-security guidelines for industrial control systems published by a consortium that features industry heavyweights such as BP, Shell and DuPont. The growing need to protect industrial and critical systems from the developing threat of cyber crime prompts the blog to refer to cyber-security as the "top operations management trend in 2011." This would seem especially true given the sophistication and severity of the recent Stuxnet worm.Read More >