Tag: IT Security

is this the end of passwords?

so i created an account on allrecipes.com, since I often get recipes…

GO train outage cause given by CN Rail

The disruption that left commuters stranded at Union Station at rush hour…

India – wish I could have hacked that sign in Durgapur…

https://www.fark.com/comments/12990054/0#c0 wxboy: These types of signs are well-known for being trivial to…

Weird CAPTCHAs I have seen.

Serious Security: How to store your users’ passwords safely

Following our popular article explaining what Adobe did wrong with its users’…

I’ve seen a lot of people asking “why does everyone think Twitter is doomed?”

@MosquitoCapital: I’ve seen a lot of people asking “why does everyone think…

How I choose passwords

pick a song or phrase with ~12 words. something burned into your…

Canada has no choice but to bar Huawei from 5G mobile networks, security experts say | National Newswatch

Source: Canada has no choice but to bar Huawei from 5G mobile…

China Shows Its Hacking Prowess at $2 Million Contest – Bloomberg

“At this year’s Tianfu Cup, which took place Oct. 16-17, news reports said…

A Pentagon official said he resigned because US cybersecurity is no match for China, calling it ‘kindergarten level’

Nicolas Chaillan, the US Air Force’s chief software officer, quit in September,…

Massive Ransomware Attack May Impact Thousands of Victims

(Bloomberg) — Just weeks after President Joe Biden implored Vladimir Putin to…

One-Fifth of U.S. Beef Capacity Wiped Out by JBS Cyberattack

(Bloomberg) — A cyberattack on JBS SA, the largest meat producer globally,…

How Amazon Sidewalk Works—and Why You May Want to Turn It Off | WIRED

The premise is convenient. But the ecommerce giant’s record on privacy isn’t…

The SolarWinds Hack Is Just the Beginning

The United States must learn to live with cyber-espionage. Source: The SolarWinds…

Feds say man broke into public water system and shut down safety processes

Indictment underscores the potential for remote intrusions to have fatal consequences. Source:…

XKCD – Security, $5 Wrench

Source: Security

Top federal cybersecurity experts explain why the SolarWinds cyberattack is such a big deal — and why it’s too soon to declare cyberwar

Cybersecurity experts including former CISA director Chris Krebs explain what happened, why…

Hacked networks will need to be burned ‘down to the ground’

It’s going to take months to kick elite hackers widely believed to…

Trump’s Twitter hacked after Dutch researcher claims he guessed password – report

Victor Gevers claimed he had access to president’s account, De Volkskrant reported,…

Elite CIA hacking unit failed to protect its systems, allowing disclosure to WikiLeaks – The Washington Post

Source: Elite CIA hacking unit failed to protect its systems, allowing disclosure…

IT at sea makes data too easy to see: Ships are basically big floating security nightmares • The Register

Shodan.io Source: IT at sea makes data too easy to see: Ships…

Wanted: People who know a half century-old computer language so states can process unemployment claims – CNN

Source: Wanted: People who know a half century-old computer language so states…

US finds Huawei has backdoor access to mobile networks globally, report says – CNET

Source: US finds Huawei has backdoor access to mobile networks globally, report…

Cryptographic Attacks: A Guide for the Perplexed – Check Point Research

Source: Cryptographic Attacks: A Guide for the Perplexed – Check Point Research

“Schneier’s Law” – Schneier on Security

Source: “Schneier’s Law” – Schneier on Security

Billions of Records Including Passwords Leaked by Smart Home Vendor

Source: Billions of Records Including Passwords Leaked by Smart Home Vendor

New U.S. Weapons Systems Are a Hackers’ Bonanza, Investigators Find – The New York Times

Source: New U.S. Weapons Systems Are a Hackers’ Bonanza, Investigators Find –…

Decoding the Chinese Super Micro super spy-chip super-scandal: What do we know – and who is telling the truth? • The Register

Source: Decoding the Chinese Super Micro super spy-chip super-scandal: What do we…

The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies – Bloomberg

Source: Businessweek – Bloomberg

Faxploit: Sending Fax Back to the Dark Ages – Check Point Research

Source: Faxploit: Sending Fax Back to the Dark Ages – Check Point…

The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED

Source: The Untold Story of NotPetya, the Most Devastating Cyberattack in History…

This company embeds microchips in its employees, and they love it – MIT Technology Review

Source: This company embeds microchips in its employees, and they love it…

Hackers Turned an Amazon Echo Into a Spy Bug | WIRED

Source: Hackers Turned an Amazon Echo Into a Spy Bug | WIRED

Email Hackers Are Winning – The Atlantic

Source: Email Hackers Are Winning – The Atlantic

Why Raspberry Pi isn’t vulnerable to Spectre or Meltdown – Raspberry Pi

Source: Why Raspberry Pi isn’t vulnerable to Spectre or Meltdown – Raspberry…

AI learns how to fool text-to-speech. That’s bad news for voice assistants

Source: AI learns how to fool text-to-speech. That’s bad news for voice…

Screwdriving. Locating and exploiting smart adult toys | Pen Test Partners

Source: Screwdriving. Locating and exploiting smart adult toys | Pen Test Partners

Charlie Miller on Why Self-Driving Cars Are So Hard to Secure From Hackers | WIRED

Source: Charlie Miller on Why Self-Driving Cars Are So Hard to Secure…

Russian hackers tracked Ukrainian artillery units using Android implant: report | Reuters

Source: Russian hackers tracked Ukrainian artillery units using Android implant: report |…

The Perfect Weapon: How Russian Cyberpower Invaded the U.S. – The New York Times

A Times investigation reveals missed signals, slow responses and a continuing underestimation…

60 Minutes shocked to find 8-inch floppies drive nuclear deterrent | Ars Technica

Air Force says archaic systems aid cyber security of Minuteman missiles. Source:…

Bots Unite to Automate the Presidential Election | WIRED

Donald Trump understands minority communities. Just ask Pepe Luis Lopez. He’s one…

The real reason America controls its nukes with ancient floppy disks – The Washington Post

America’s nuclear arsenal depends on a technology you haven’t used since the…

mikeash.com: Friday Q&A 2016-02-19: What Is the Secure Enclave?

Source: mikeash.com: Friday Q&A 2016-02-19: What Is the Secure Enclave?

Hackers Remotely Kill a Jeep on the Highway—With Me in It | WIRED

I was driving 70 mph on the edge of downtown St. Louis…

A Technical Perspective on the Apple iPhone Case | Electronic Frontier Foundation

A Technical Perspective on the Apple iPhone Case | Electronic Frontier Foundation.

Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani – YouTube

Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani…

Is Blockchain the most important IT invention of our age? | John Naughton | Opinion | The Guardian

Is Blockchain the most important IT invention of our age? | John…

FTC Report on Internet of Things Urges Companies to Adopt Best Practices to Address Consumer Privacy and Security Risks | Federal Trade Commission

FTC Report on Internet of Things Urges Companies to Adopt Best Practices…

Internet of Things security is so bad, there’s a search engine for sleeping kids | Ars Technica

Internet of Things security is so bad, there’s a search engine for…