Category: Uncategorized
You are here: Home \ Uncategorized \ Page 4
23 October 2015 - 11:30, by , in Uncategorized, No comments
Two troublesome words tucked into proposed US legislation related to cybersecurity for cars and trucks could have some unintended consequences for vehicle security if it ever becomes the law of the land. Car hacking has attracted increased scrutiny from lawmakers in recent months, after researchers disclosed security vulnerabilities in several Fiat Chrysler models, causing the car maker...
22 October 2015 - 13:03, by , in Uncategorized, No comments
You might like US Navy pays millions to cling to Windows XP World Backup Day – is your data safe enough? Revamping an old technology to go where GPS signals cannot reach $80 million yacht hijacked by students spoofing GPS signals About the author John Zorabedian is a blogger, copywriter and editor at Sophos. He...
22 October 2015 - 11:39, by , in Uncategorized, No comments
The Information Commissioner’s Office (ICO) in the UK is a public service body set up with excellent aims. As the organisation’s website explains, its remit is: To uphold information rights in the public interest, promoting openness by public bodies and data privacy for individuals. It’s not an irony that openness and privacy go together: if...
22 October 2015 - 10:04, by , in Uncategorized, No comments
We already know that Facebook’s facial recognition technology – called “DeepFace” – rivals humans’ ability to recognize people, regardless of lighting changes and camera angles. It doesn’t hurt that Facebook photos are higher-quality than the grainy images that cops can pull from CCTV footage and other sources. As it turns out, Australia’s law enforcement agencies are more...
21 October 2015 - 16:10, by , in Uncategorized, No comments
In a briefing filed on Monday in a New York court, Apple said it would be “impossible” to access the data stored on the majority of locked iPhones. Responding to Judge James Orenstein – who wanted help in deciding whether to fulfil a US Justice Department request that would see the company forced to aid the authorities...
21 October 2015 - 11:56, by , in Uncategorized, No comments
If you’ve ever wondered how device manufacturers like Samsung or LG know how to build their Android smartphones to support new versions of the OS, here’s your answer: an obscure document called the Android Compatibility Definition. The document lays out all of the specifications for hardware and software compatibility, from device configurations, memory and power usage...
21 October 2015 - 11:39, by , in Uncategorized, No comments
On the one hand, CWA (“Crackas With Attitude”), may have been a duo of pot-smoking, pro-Palestine 13-year-olds who socially engineered Verizon and got it to reset CIA Director John Brennan’s AOL address. They might then have posted taxpayer and other personal information of more than a dozen top US intelligence officials, plus a government letter...
19 October 2015 - 14:15, by , in Uncategorized, No comments
Online retail giant Amazon has filed a lawsuit against more than 1100 people it says posted fake reviews on its website. The company is suing 1114 defendants – all named as “John Does” because it has yet to uncover their real identities – over a breach of its review policy that prohibits paid-for or fictional reviews. In a...
17 October 2015 - 0:10, by , in Uncategorized, No comments
A hacker detained in Malaysia now faces extradition to the US to face charges that he provided material support to the Islamic State, which US Department of Justice (DOJ) officials are calling a “first of its kind” case. It’s certainly not a typical case of the US seeking extradition of an individual for cybercrimes. Rather,...
16 October 2015 - 13:50, by , in Uncategorized, No comments
Some of the world’s largest tech firms have come together to issue a public protest against a controversial US cybersecurity bill. The Cybersecurity Information Sharing Act (CISA), due to be laid out for Senate consideration in the next few weeks, has noble aims based around the sharing of threat intelligence between private companies and the government....