Category: Computer Security

Most Android phones at risk from simple text hack, researcher says – CNET

Last year, more than 1 billion Android devices shipped around the globe. Security firm Zimperium says this vulnerability could affect 95 percent of them. Source: >>>

Posted: July 27, 2015 in Computer, Security

After Jeep Hack, Chrysler Recalls 1.4M Vehicles for Bug Fix

Welcome to the age of hackable automobiles, when two security researchers can cause a 1.4 million product recall. Source: After Jeep Hack, Chrysler Recalls 1.4M >>>

Posted: July 24, 2015 in Computer, Security

F.T.C. Accuses LifeLock of Violating Settlement – The New York Times

The F.T.C. said that from 2012 to 2014, LifeLock failed to alert customers as soon as their identities were used by thieves and also failed >>>

Posted: July 22, 2015 in Computer, Security

Hacking Drones Close to Being Drawn up by Boeing and Hacking Team

Leaked emails between Italian spyware vendor Hacking Team and Boeing subsidiary Insitu revealed that drones carrying malware to infect targeted computers via Wi-Fi by flying >>>

Posted: July 22, 2015 in Computer, Internet, Security

Is a gun-firing drone legal under the Second Amendment? — Hopes&Fears — flow “Question”

  Did you see that civilian-grade drone equipped with a semi-automatic handgun that was being fired remotely? We asked the experts if it was legal. >>>

Cablevision Sued for Turning User Routers into Public Hotspots | DSLReports, ISP Information

News: Cablevision is being sued by a man who claims the company’s decision to turn his home gateway into a publicly-available hotspot violates the Computer >>>

Posted: July 21, 2015 in Computer, Internet, Security

Hackers Remotely Kill a Jeep on the Highway—With Me in It

I was driving 70 mph on the edge of downtown St. Louis when the exploit began to take hold. Source: Hackers Remotely Kill a Jeep >>>

Posted: July 21, 2015 in Computer, Security

Privacy talk at DEF CON canceled under questionable circumstances

Earlier this month, several news outlets reported on a powerful tool in the fight between those seeking anonymity online, versus those who push for surveillance >>>

Posted: July 13, 2015 in Computer, Security

What Is the Big Secret Surrounding Stingray Surveillance? – Scientific American

State and local law enforcement agencies across the U.S. are setting up fake cell towers to gather mobile data, but few will admit it Source: >>>

Posted: June 25, 2015 in Computer, Mobile, Security

Google eavesdropping tool installed on computers without permission

Privacy advocates claim always-listening component was involuntarily activated within Chromium, potentially exposing private conversations Source: Google eavesdropping tool installed on computers without permission | Technology >>>

Posted: June 23, 2015 in Computer, Security