Wednesday, August 31, 2016
Dropbox employee’s password reuse led to theft of 60M+ user credentials
Kate Conger, reporting at TechCrunch:
Dropbox disclosed in 2012 that an employee’s password was acquired and used to access a document with email addresses, but did not disclose that passwords were also acquired in the theft. …
Wednesday, October 14, 2015
Hackers Can Silently Control Siri From 16 Feet Away
Well this is concerning:
A pair of researchers at ANSSI, a French government agency devoted to information security, have shown that they can use radio waves to silently trigger voice commands on any Android phone or iPhone that has Google Now or …
Saturday, February 23, 2013
Facebook is buying your loyalty card historyCotton Delo of Ad Age:
The targeting would hypothetically enable Coca-Cola to target to teenagers who’ve bought soda in the last month, or Pampers to show ads to North Carolina residents who’ve recently bought baby products, since Facebook’s own array of …
Thursday, January 10, 2013
US suspects Iran behind DDoS attacks on banksThese look a lot like “feeler” operations, meant to gauge the reaction attackers can expect from victim institutions and nations. The United States (read: Congress) must act immediately to ensure that we’re ready when attackers stop slowing down or …
Wednesday, December 19, 2012
Tor: An Anonymous, And Controversial, Way to Web-SurfTor gets a headline at WSJ.com.
Thursday, November 8, 2012
Twitter and Two-Factor AuthenticationTwo-factor authentication is a pain in the ass. Just ask my Google account or my Dropbox account. But it’s a no-brainer. Savvy users will flock to it, seeing the value in the headache. Less-than-savvy users don’t need to be forced into it, but Twitter is as good …
Thursday, October 18, 2012
Wireless attack could fatally turn pacemakers against patientsPatrick Gray, writing at The Register:
Jack also warned of a worst-case scenario in which a worm could infect multiple devices, spreading from patient to patient, re-flashing the devices with malicious code as it foes. This code could be …
Thursday, October 18, 2012
White House review: no active spying by HuaweiJoseph Menn, quoting an anonymous source for Reuters:
We knew certain parts of government really wanted” evidence of active spying, said one of the people, who requested anonymity. “We would have found it if it were there.
I don’t know enough about …
Wednesday, September 19, 2012
Virgin Mobile USA’s inadequate response to a good-faith vulnerability disclosureDeveloper Kevin Burke describes in damning detail how easy it is to brute force Virgin Mobile USA account PINs, as well as the company’s incompetent and opaque handling of the situation.