Skip to main content

Security

Microsoft Hardens Windows Phone for Government Duty

posted onAugust 25, 2014
by l33tdawg

Microsoft's love-hate relationship with the U.S. government is turning a bit more amicable, at least when it comes to Windows Phone.

The U.S. government is a big technology buyer. The 2014 federal IT budget weighs in at over $81 billion. For fiscal 2015, federal IT spending will to dip somewhat to $79 billion, according to the White House's budget (PDF).

This 16-Year-Old Wants To Make Email More Secure Than Ever

posted onAugust 21, 2014
by l33tdawg

In the next two weeks, Abe Storey is aiming to launch his latest startup, an email product called Lock Up Mail.

He’s on a self-imposed time crunch, because after that, he’s starting his junior year of high school. “In its most simple form, locked Up Mail is two things. One, it’s super secure email. The other is a new authentication system,” Storey told Business Insider.

UPS now the third company in a week to disclose data breach

posted onAugust 21, 2014
by l33tdawg

Credit and debit card information belonging to customers who did business at 51 UPS Store Inc. locations in 24 states this year may have been compromised as the result of an intrusion into the company's networks.

In a statement Wednesday, UPS said it was recently notified by law enforcement officials about a "broad-based malware intrusion" of its systems.

Hackers broke into Malaysian Department of Civil Aviation ONE DAY after MH370 incident

posted onAugust 20, 2014
by l33tdawg

The computers of high-ranking officials in agencies involved in the MH370 investigation were hacked and classified information was stolen.

The stolen information was allegedly being sent to a computer in China before CyberSecurity Malaysia – a Ministry of Science, Technology and Innovation agency – had the transmissions blocked and the infected machines shut down.

Think crypto hides you from spooks on Facebook? THINK AGAIN

posted onAugust 20, 2014
by l33tdawg

Activists just got another reason to worry about what spooks might be able to learn about them, with boffins demonstrating that a decent traffic fingerprint can tell an attacker what's going on, even if an app is defended by encryption.

The researchers from the Universities of Padua and Rome have found that for activities like posting messages on a friend's Facebook wall, browsing a profile on a social network, or sending an e-mail, there's no need to decrypt an encrypted data flow.

Hackers break into Nuclear Regulatory Commission computers

posted onAugust 20, 2014
by l33tdawg

Hackers have successfully infiltrated Nuclear Regulatory Commission (NRC) computers twice in the past three years, according to a leaked internal investigation report.

News of the breaches broke via Nextgov, which claims to have learned of the breaches after issuing open records requests to the NRC. At the time of publishing the NRC had not responded to V3's request for comment.

Web fights back against poor security

posted onAugust 20, 2014
by l33tdawg

The web is fighting back against websites and apps that do not use encryption.

Such services are considered to have good security when they implement a technology known as Transport Layer Security or Secure Sockets Layer (SSL), which encrypts traffic between an end user and the site. Google, Twitter, Facebook and banks are good examples of this practice.

British spy agency attempts mammoth hack

posted onAugust 20, 2014
by l33tdawg

Britain's Government Communications Headquarters (GCHQ) has been scanning every public-facing server in 27 countries for several years to find any weak systems in waht some have described as a 'gargantuan scale' hack.

The agency's so-called 'Hacienda' program, revealed by German publication Heise, started in 2009 when GCHQ decided to apply the standard tool of port scanning against entire nations.

Hacking Traffic Lights is Apparently Really Easy

posted onAugust 20, 2014
by l33tdawg

In the 1969 classic The Italian Job, Michael Caine and crew commit a major gold heist by hacking into the traffic light system of Turin, Italy, to cause a massive traffic jam, giving the robbers a perfectly synced path to escape through the gridlock.

As it turns out, this piece of high-action Hollywood theatrics is not merely screenwriter fantasy. According to cyber security researchers at the University of Michigan, pulling off a caper like that wouldn’t even be difficult today.