In the last few years, Pedram Hayati, founder of Australian IT company Security Dimension, has been developing a custom honeypot intelligence system called Smart Honeypot.
Honeypots - fake systems designed to look like the real thing - can be used for many different purposes. One of these is to determine what attackers are after, their capabilities and the tactics they use to achieve their goals, and this is why Hayati set up thirteen Smart Honeypots in different geographic regions of Amazon Web Services and Google Cloud (America, Europe, Asia and Oceania).
Have you put much thought lately into what’s stored in your garage? If you have valuables in there next to your car, you might want to think about the hacking potential of your garage door. As it turns out, even your children’s old toys can be ideal for hacking into your home.
Samy Kamkar, a security researcher, has found a way to hack a common Mattel toy to turn it into a universal garage door opener. The toy Kamkar used, IM Me, is a discontinued pocket computer. It allows children to chat with pals who are nearby.
The US government is badly leaking data. And China, the prime suspect in the latest data breach, isn't helping.
The most recent victim of a massive data breach is the Office of Personnel Management (OPM), the federal agency responsible for vetting about 90 percent of the people for working in the federal government.
The federal agency said Thursday its systems were breached in April That vetting data is reportedly safe, said officials, but performance reviews and job assignments data may have been taken.
A Commerce Department standards body has released preliminary guidelines for masking the personal data of individuals captured by traffic sensors, speed cameras and other Internet-connected government systems.
Coincidentally, the publication came out the day a Spanish researcher demonstrated that any stalker can monitor the driving habits of customers patronizing dozens of European parking lots. An unnamed major provider of parking management systems allegedly has not been implementing typical security settings.
If you go down to the deep web today, you’ll be following hot on the heels of a digital beast. In a matter of hours last week, the entire semi-anonymising Tor network, where activists and criminals alike try to hide from the gaze of their respective authorities, was traversed by PunkSPIDER, an automated scanner that pokes websites to uncover vulnerabilities.