Skip to main content

Security

Internet of Things needs to be encrypted to offer proper security

posted onJuly 22, 2014
by l33tdawg

All data sent via the Internet of Things (IoT) needs to be secured with encryption, according to the findings of recent INQUIRER research.

The research, carried out in conjunction with Intel, revealed that 44 percent of INQUIRER readers believe that data encryption is the best way to ensure the IoT is secure. 23 percent would prefer to see users being given full control over their own data, while 10 percent believe the best IoT security option is to not store any usage data at all.

Jonathan Zdziarski finds evidence of backdoors in Apple iOS

posted onJuly 22, 2014
by l33tdawg

A number of undocumented features in iOS have been found to essentially create backdoors for siphoning large amounts of users' personal data from Apple devices.

Jonathan Zdziarski, a researcher who often trains federal and state law enforcement agencies in forensic techniques, revealed the existence of the mostly hidden features. The data-stealing avenues have evolved over the last few years and may have been used by the U.S. National Security Agency to collect data on potential targets, Zdziarski said.

AirMagnet Wi-Fi security tool takes aim at drones

posted onJuly 22, 2014
by l33tdawg

In its quest to help enterprises seek out and neutralize all threats to their Wi-Fi networks, AirMagnet is now looking to the skies.

In a free software update to its AirMagnet Enterprise product last week, the Wi-Fi security division of Fluke Networks added code specifically crafted to detect the Parrot AR Drone, a popular unmanned aerial vehicle that costs a few hundred dollars and can be controlled using a smartphone or tablet.

Tesla Model S hacked in security contest

posted onJuly 21, 2014
by l33tdawg

The Tesla Model S is essentially a computer on wheels, and as such, it has become the target of a hacking contest at the SyScan 360 security conference in Beijing. One of the contestants, Qihoo 360 Technology Co. apparently succeeded and were able to take over several of the car’s systems. While the car was in motion, the car’s locks, horn, headlights and skylight were all remotely operated by the contestants.

Cydia's Popular BigBoss Repo Allegedly Gets Hacked

posted onJuly 21, 2014
by l33tdawg

BigBoss, one of the biggest and most popular Cydia repositories, has allegedly been hacked. Attackers “Kim Jong-Cracks” claim to have gained access to all packages — including paid titles — and made them available for free via their own repo. Cydia users are advised to steer well clear of it, however.

Router hacking competition announced for Defcon

posted onJuly 21, 2014
by l33tdawg

Well-known manufacturers of residential and SME wireless routers will have reason to feel nervous as hackers at the annual DefCon security conference aim to break into their products to find undocumented vulnerabilities or so-called Zero Days.

The sponsors behind the DefCon SOHOpelessly Broken competition, Independent Security Evalutators and digital rights lobby group Electronic Frontier Foundation are confident the hackers will find vulnerabilities too, as a number of router vendors have been accused of carelessness in security terms in the past.

Almost a million fake apps are targeting your phone

posted onJuly 17, 2014
by l33tdawg

Fake apps dressed up to look like official ones but actually designed to steal user data are increasingly targeting Android phone users, according to a study by Trend Micro.

The company looked at the top 50 free apps in Google's Play Store and then searched Google's app store and others to see if fake versions existed. It found fake versions existed for 77 percent of the apps. The fake apps are often made to look like the real ones and have the same functions, but carry a dangerous extra payload.

A Smartphone for Consumers Who Want Privacy

posted onJuly 17, 2014
by l33tdawg

IF there’s a symbol for the idea that privacy is on people’s minds, it’s the Blackphone.

The Blackphone, which went on sale this week for $629, is billed as the first smartphone built solely with privacy and security in mind. It is definitely more secure than your average phone, but comes with trade-offs that most consumers might not need or enjoy. It’s probably best for reporters, dissidents and companies concerned with corporate security.

Child abuse images dragnet snares 660 suspected paedophiles

posted onJuly 17, 2014
by l33tdawg

An unprecedented six-month operation coordinated by the NCA and involving 45 police forces across England, Wales, Scotland and Northern Ireland has led to the arrest of 660 suspected paedophiles.

More than 400 children across the UK have been safeguarded. Some of those arrested had unsupervised access to children in the course of their work. They include doctors, teachers, scout leaders, care workers and former police officers.