Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “An Open Letter to Android or “Android, You Are Shit!”” is an epic rant about my six year long (so far) relationship with Android mobile devices (no spoilers here – go and read it). Show More Summary
Organisations want to increase investment in IoT to boost efficiency, despite suspicion about what it means for enterprise cybersecurity.
This modular wireless security camera system is affordable and easy to configure, but needs some refinement to be really compelling.
The Russian government may have hacked Hillary Clinton's campaign and the Democratic National Committee (DNC) to support Donald Trump's campaign, but there's no hard technical proof.
This year was a busy one for security and hackers. We expect more of the same in 2017, with a few new twists. The post The Biggest Security Threats Coming in 2017 appeared first on WIRED.
The leak exposed personal data including Social Security numbers to the assigned posts of critical members of the US military, some of whom hold the highest levels of security clearance.
The year that politics got hacked was also a record-breaking year for sheer size of corporate breaches. The post The Year's Biggest Hacks, From Yahoo To the DNC appeared first on WIRED.
The Windows kernel privilege escalation vulnerability CVE-2016-7255 has received a lot of media attention. On November’s Patch Tuesday, Microsoft released a fix for this vulnerability as part of bulletin MS16-135. CVE-2016-7255 was used to perform a targeted attack and a sample was found in the wild, according to Microsoft. Show More Summary
Dear Android: I know you are an operating system and probably cannot (yet?) read on your own. However, recent events compelled me to write this letter to you; an idea for it literally came to me in a dream. You see, I have carried an Android phone in my pocket since 2010, for almost six years. Show More Summary
The Department of Homeland Security and FBI laid out spear phishing techniques so network admins can better thwart what is alleged to be Russian hacking campaigns.
The US will deport dozens of diplomats, and has named specific individuals implicated in the cyberattacks. The post Obama’s Russian Hacking Retaliation Is Biggest “Since the Cold War" appeared first on WIRED.
Nevada state government's website was leaking thousands of social security numbers, and highly sensitive personal data. They said it was a hack. Spoiler alert: It wasn't.
The data includes their dates of birth, home addresses, citizenship, and driving license and social security numbers of the applicants.
Singapore's immigration department says it will begin collecting iris scans of citizens and permanent residents as part of efforts to improve the "effectiveness and efficiency" of its operations.
In the previous post in this series, I outlined how cybercriminals will use the holiday season to victimize unwary consumers and target businesses. They will also dive deeper into leveraging devices connected to the Internet of Things (IoT). Show More Summary
Google's first wave of security changes to convert webmasters to encrypted HTTPS target pages that ask for login data or credit card information.
Knowing what cybercriminals are targeting today is easy. Their attacks are loud, impactful, and have the elegance of a herd of bulls crashing through a china shop. The tougher challenge is figuring out where they will take aim tomorrow. Show More Summary
In uncertainty times, these non-profits need your year-end charity to protect privacy and civil liberties online. The post Where to Donate to Protect the Internet in 2017 appeared first on WIRED.
Floki Bot, new financial malware, is popular with English-, Portuguese-, and Russian-speaking underground criminal markets, winning over cybercriminals with new features and functionality. It is currently in use by a number of cybercrime...Show More Summary
Did Russia hack the DNC? Did North Korea hack Sony Pictures? Try to answer these questions and you run into the attribution problem. The post Hacker Lexicon: What Is the Attribution Problem? appeared first on WIRED.