Tag: IT Security
is this the end of passwords?
so i created an account on allrecipes.com, since I often get recipes…
GO train outage cause given by CN Rail
The disruption that left commuters stranded at Union Station at rush hour…
India – wish I could have hacked that sign in Durgapur…
https://www.fark.com/comments/12990054/0#c0 wxboy: These types of signs are well-known for being trivial to…
Weird CAPTCHAs I have seen.
Serious Security: How to store your users’ passwords safely
Following our popular article explaining what Adobe did wrong with its users’…
I’ve seen a lot of people asking “why does everyone think Twitter is doomed?”
@MosquitoCapital: I’ve seen a lot of people asking “why does everyone think…
Canada has no choice but to bar Huawei from 5G mobile networks, security experts say | National Newswatch
Source: Canada has no choice but to bar Huawei from 5G mobile…
China Shows Its Hacking Prowess at $2 Million Contest – Bloomberg
“At this year’s Tianfu Cup, which took place Oct. 16-17, news reports said…
A Pentagon official said he resigned because US cybersecurity is no match for China, calling it ‘kindergarten level’
Nicolas Chaillan, the US Air Force’s chief software officer, quit in September,…
Massive Ransomware Attack May Impact Thousands of Victims
(Bloomberg) — Just weeks after President Joe Biden implored Vladimir Putin to…
One-Fifth of U.S. Beef Capacity Wiped Out by JBS Cyberattack
(Bloomberg) — A cyberattack on JBS SA, the largest meat producer globally,…
How Amazon Sidewalk Works—and Why You May Want to Turn It Off | WIRED
The premise is convenient. But the ecommerce giant’s record on privacy isn’t…
The SolarWinds Hack Is Just the Beginning
The United States must learn to live with cyber-espionage. Source: The SolarWinds…
Feds say man broke into public water system and shut down safety processes
Indictment underscores the potential for remote intrusions to have fatal consequences. Source:…
Top federal cybersecurity experts explain why the SolarWinds cyberattack is such a big deal — and why it’s too soon to declare cyberwar
Cybersecurity experts including former CISA director Chris Krebs explain what happened, why…
Hacked networks will need to be burned ‘down to the ground’
It’s going to take months to kick elite hackers widely believed to…
Trump’s Twitter hacked after Dutch researcher claims he guessed password – report
Victor Gevers claimed he had access to president’s account, De Volkskrant reported,…
Elite CIA hacking unit failed to protect its systems, allowing disclosure to WikiLeaks – The Washington Post
Source: Elite CIA hacking unit failed to protect its systems, allowing disclosure…
IT at sea makes data too easy to see: Ships are basically big floating security nightmares • The Register
Shodan.io Source: IT at sea makes data too easy to see: Ships…
Wanted: People who know a half century-old computer language so states can process unemployment claims – CNN
Source: Wanted: People who know a half century-old computer language so states…
US finds Huawei has backdoor access to mobile networks globally, report says – CNET
Source: US finds Huawei has backdoor access to mobile networks globally, report…
Cryptographic Attacks: A Guide for the Perplexed – Check Point Research
Source: Cryptographic Attacks: A Guide for the Perplexed – Check Point Research
Billions of Records Including Passwords Leaked by Smart Home Vendor
Source: Billions of Records Including Passwords Leaked by Smart Home Vendor
New U.S. Weapons Systems Are a Hackers’ Bonanza, Investigators Find – The New York Times
Source: New U.S. Weapons Systems Are a Hackers’ Bonanza, Investigators Find –…
Decoding the Chinese Super Micro super spy-chip super-scandal: What do we know – and who is telling the truth? • The Register
Source: Decoding the Chinese Super Micro super spy-chip super-scandal: What do we…
The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies – Bloomberg
Source: Businessweek – Bloomberg
Faxploit: Sending Fax Back to the Dark Ages – Check Point Research
Source: Faxploit: Sending Fax Back to the Dark Ages – Check Point…
The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED
Source: The Untold Story of NotPetya, the Most Devastating Cyberattack in History…
This company embeds microchips in its employees, and they love it – MIT Technology Review
Source: This company embeds microchips in its employees, and they love it…
Hackers Turned an Amazon Echo Into a Spy Bug | WIRED
Source: Hackers Turned an Amazon Echo Into a Spy Bug | WIRED
Email Hackers Are Winning – The Atlantic
Source: Email Hackers Are Winning – The Atlantic
Why Raspberry Pi isn’t vulnerable to Spectre or Meltdown – Raspberry Pi
Source: Why Raspberry Pi isn’t vulnerable to Spectre or Meltdown – Raspberry…
AI learns how to fool text-to-speech. That’s bad news for voice assistants
Source: AI learns how to fool text-to-speech. That’s bad news for voice…
Screwdriving. Locating and exploiting smart adult toys | Pen Test Partners
Source: Screwdriving. Locating and exploiting smart adult toys | Pen Test Partners
Charlie Miller on Why Self-Driving Cars Are So Hard to Secure From Hackers | WIRED
Source: Charlie Miller on Why Self-Driving Cars Are So Hard to Secure…
Russian hackers tracked Ukrainian artillery units using Android implant: report | Reuters
Source: Russian hackers tracked Ukrainian artillery units using Android implant: report |…
The Perfect Weapon: How Russian Cyberpower Invaded the U.S. – The New York Times
A Times investigation reveals missed signals, slow responses and a continuing underestimation…
60 Minutes shocked to find 8-inch floppies drive nuclear deterrent | Ars Technica
Air Force says archaic systems aid cyber security of Minuteman missiles. Source:…
Bots Unite to Automate the Presidential Election | WIRED
Donald Trump understands minority communities. Just ask Pepe Luis Lopez. He’s one…
The real reason America controls its nukes with ancient floppy disks – The Washington Post
America’s nuclear arsenal depends on a technology you haven’t used since the…
mikeash.com: Friday Q&A 2016-02-19: What Is the Secure Enclave?
Source: mikeash.com: Friday Q&A 2016-02-19: What Is the Secure Enclave?
Hackers Remotely Kill a Jeep on the Highway—With Me in It | WIRED
I was driving 70 mph on the edge of downtown St. Louis…
A Technical Perspective on the Apple iPhone Case | Electronic Frontier Foundation
A Technical Perspective on the Apple iPhone Case | Electronic Frontier Foundation.
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani – YouTube
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani…
Is Blockchain the most important IT invention of our age? | John Naughton | Opinion | The Guardian
Is Blockchain the most important IT invention of our age? | John…
FTC Report on Internet of Things Urges Companies to Adopt Best Practices to Address Consumer Privacy and Security Risks | Federal Trade Commission
FTC Report on Internet of Things Urges Companies to Adopt Best Practices…
Internet of Things security is so bad, there’s a search engine for sleeping kids | Ars Technica
Internet of Things security is so bad, there’s a search engine for…


