Archives:
You are here: Home \ 2015 \ Page 6
10 November 2015 - 11:01, by , in Uncategorized, No comments
A 15-year-old schoolboy arrested and questioned over the TalkTalk cyberattack is suing three UK newspapers over alleged breach of privacy. Lawyers for the teenager, who’s from Northern Ireland, told the court that the boy was recognizable in the newspapers’ coverage, even though the publications altered his image. According to the Irish Independent, his lawyers said...
10 November 2015 - 10:56, by , in Uncategorized, No comments
A fugitive is back in custody having spent a year posting selfies onto Facebook showing his tanned mug and his beachside hideaway. Nick Grove’s 2014 escape from jail, by scaling a barbed-wire fence, would have been worthy of being the next Jason Bourne movie if only he’d been followed around by a Hollywood production staff...
9 November 2015 - 20:58, by , in News, No comments
We come across a lot of spams, scams and phishing attempts here at Naked Security. Some come to our “send us a comment” email address, because it’s widely publicised. Some come to our personal addresses, especially those of us who have had the same email for many years. And many – the most interesting! – are reported...
9 November 2015 - 11:57, by , in News, No comments
It’s about six weeks since we first wrote about XcodeGhost. That’s the Apple Mac malware that was specially created by crooks in China to create iOS malware. You read that correctly. Just as the infamous Stuxnet virus tried to infect PCs with the ultimate goal (allegedly) of indirectly infecting uranium centrifuge controllers, so XcodeGhost aims...
9 November 2015 - 11:20, by , in Uncategorized, No comments
A Scottish citizen was indicted on Thursday by a federal grand jury in San Francisco for allegedly using Twitter to spread disinformation, causing the stock prices of two companies to plummet. The Department of Justice (DOJ) said that James Alan Craig, 62, of Dunragit, Scotland, allegedly set up Twitter accounts using names similar to real...
9 November 2015 - 11:02, by , in News, No comments
Mobile apps are regularly leaking information to third parties, according to research from the Massachusetts Institute of Technology (MIT), Harvard, and Carnegie-Mellon. The researchers tested 110 popular, free apps – half of them Android and half iOS – to find out which ones share personal, behavioral, and location data with third-party websites. Make that very...
9 November 2015 - 10:27, by , in News, No comments
The unflappable and suave James Bond is known for impeccable taste in clothes, cars and cocktails. The Bond brand has been attractive to luxury goods companies including car makers Aston Martin and Jaguar, which produced special editions for the latest film in the franchise, “Spectre.” Sony even made a Bond Edition smartphone, the Xperia Z5, complete...
6 November 2015 - 16:53, by , in Uncategorized, No comments
Members of the loose hacker collective Anonymous followed through on a pledge to release the names of members of the Ku Klux Klan, but #OpKKK was flawed from the get-go by uncoordinated document dumps and smearing of innocent people who are in no way connected to the KKK. The plan for the op was to “unhood” 1000...
6 November 2015 - 16:13, by , in Uncategorized, No comments
Swiss-based encrypted email provider ProtonMail – developed at the CERN research facility in 2013 to withstand surveillance by the world’s increasingly inquisitive intelligence agencies – has revealed that it handed over 15 bitcoins (about $6000/£4000) to stop a Distributed Denial of Service (DDoS) attack. With the company’s main site still down, ProtonMail took to WordPress to explain...
6 November 2015 - 13:57, by , in News, No comments
We’ve written about ransomware a lot, because it’s such an odious and in-your-face sort of threat. Ironically, ransomware isn’t actually the most dangerous or insidious sort of malware. Ransomware crooks don’t steal your data covertly, or keep track of you via your webcam, or try to read your emails over an extended period for competitive...