All Blogs / Technology / Security / Popular

Monthly Blog Round-Up – December 2016

Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “An Open Letter to Android or “Android, You Are Shit!”” is an epic rant about my six year long (so far) relationship with Android mobile devices (no spoilers here – go and read it). Show More Summary

IoT in 2017: Why usage is going to grow, despite the security risks

Organisations want to increase investment in IoT to boost efficiency, despite suspicion about what it means for enterprise cybersecurity.

Blink, First Take: Good-value security camera system for homes and small businesses

This modular wireless security camera system is affordable and easy to configure, but needs some refinement to be really compelling.

No smoking gun for Russian DNC hacks

The Russian government may have hacked Hillary Clinton's campaign and the Democratic National Committee (DNC) to support Donald Trump's campaign, but there's no hard technical proof.

The Biggest Security Threats Coming in 2017

This year was a busy one for security and hackers. We expect more of the same in 2017, with a few new twists. The post The Biggest Security Threats Coming in 2017 appeared first on WIRED.

US government subcontractor leaks confidential military personnel data

The leak exposed personal data including Social Security numbers to the assigned posts of critical members of the US military, some of whom hold the highest levels of security clearance.

The Year’s Biggest Hacks, From Yahoo To the DNC

The year that politics got hacked was also a record-breaking year for sheer size of corporate breaches. The post The Year's Biggest Hacks, From Yahoo To the DNC appeared first on WIRED.

Digging Into a Windows Kernel Privilege Escalation Vulnerability: CVE-2016-7255

The Windows kernel privilege escalation vulnerability CVE-2016-7255 has received a lot of media attention. On November’s Patch Tuesday, Microsoft released a fix for this vulnerability as part of bulletin MS16-135. CVE-2016-7255 was used to perform a targeted attack and a sample was found in the wild, according to Microsoft. Show More Summary

An Open Letter to Android or “Android, You Are Shit!”

Dear Android: I know you are an operating system and probably cannot (yet?) read on your own. However, recent events compelled me to write this letter to you; an idea for it literally came to me in a dream. You see, I have carried an Android phone in my pocket since 2010, for almost six years. Show More Summary

Obama, Feds outline technical, spear phishing details, sanctions vs. Russia over cyber attacks

The Department of Homeland Security and FBI laid out spear phishing techniques so network admins can better thwart what is alleged to be Russian hacking campaigns.

Obama’s Russian Hacking Retaliation Is Biggest “Since the Cold War”

The US will deport dozens of diplomats, and has named specific individuals implicated in the cyberattacks. The post Obama’s Russian Hacking Retaliation Is Biggest “Since the Cold War" appeared first on WIRED.

Stop calling everything a "hack"

Nevada state government's website was leaking thousands of social security numbers, and highly sensitive personal data. They said it was a hack. Spoiler alert: It wasn't.

Nevada accidentally leaks thousands of medical marijuana dispensary applications

The data includes their dates of birth, home addresses, citizenship, and driving license and social security numbers of the applicants.

Singapore to record iris scans of citizens

Singapore's immigration department says it will begin collecting iris scans of citizens and permanent residents as part of efforts to improve the "effectiveness and efficiency" of its operations.

Next Targets for Cybercriminals: the Long Term (Part 2)

In the previous post in this series, I outlined how cybercriminals will use the holiday season to victimize unwary consumers and target businesses. They will also dive deeper into leveraging devices connected to the Internet of Things (IoT). Show More Summary

Chrome will soon mark some HTTP pages as 'non-secure'

Google's first wave of security changes to convert webmasters to encrypted HTTPS target pages that ask for login data or credit card information.

Next Targets for Cybercriminals: the Short Term (Part 1)

  Knowing what cybercriminals are targeting today is easy. Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a china shop. The tougher challenge is figuring out where they will take aim tomorrow. Show More Summary

Where to Donate to Protect the Internet in 2017

In uncertainty times, these non-profits need your year-end charity to protect privacy and civil liberties online. The post Where to Donate to Protect the Internet in 2017 appeared first on WIRED.

Floki Bot a Sensation With International Cybercriminals

Floki Bot, new financial malware, is popular with English-, Portuguese-, and Russian-speaking underground criminal markets, winning over cybercriminals with new features and functionality. It is currently in use by a number of cybercrime...Show More Summary

Hacker Lexicon: What Is the Attribution Problem?

Did Russia hack the DNC? Did North Korea hack Sony Pictures? Try to answer these questions and you run into the attribution problem. The post Hacker Lexicon: What Is the Attribution Problem? appeared first on WIRED.

Copyright © 2015 Regator, LLC