How a Hacker's Mom Broke Into a Prison—and the Warden's Computer

How a Hacker's Mom Broke Into a Prison—and the Warden's Computer

Normally, Strand embarks on these missions himself, or deploys one of his experienced colleagues at Black Hills Information Security.John Strand, Black Hills Information Security.

Gmail Is Catching More Malicious Attachments With Deep Learning

Gmail Is Catching More Malicious Attachments With Deep Learning

Currently 56 percent of malware threats against Gmail users come from Microsoft Office documents, and 2 percent come from PDFs. In the months that it's been active, the new scanner has increased its daily malicious Office document detection by 10 percent.

Microsoft's Secured-Core PC Feature Protects Critical Code

Microsoft's Secured-Core PC Feature Protects Critical Code

Microsoft already offers Windows Secure Boot, a feature that checks for cryptographic signatures to confirm software integrity.Instead of relying on firmware, Microsoft has worked with AMD, Intel, and Qualcomm to make new central processing unit chips that can run integrity checks during boot in a controlled, cryptographically verified way.

A Tiny Piece of Tape Tricked Teslas Into Speeding Up 50 MPH

A Tiny Piece of Tape Tricked Teslas Into Speeding Up 50 MPH

The worse news is that said data has since been discovered in an online hacking forum, as first reported by ZDNet. The haul includes names, addresses, phone numbers, emails, and dates of birth, and celebrities, politicians, and journalists are among those affected.

How Trump Hollowed Out US National Security

How Trump Hollowed Out US National Security

As Richard Grenell, the current US ambassador to Germany, starts his second day on the job as the nation’s acting director of national intelligence, his arrival also marks the ouster of not only his predecessor, Joseph Maguire, but reportedly also of DNI principal executive Andrew Hallman.

Over 500 Chrome Extensions Secretly Uploaded Private Data

Over 500 Chrome Extensions Secretly Uploaded Private Data

The plugins then redirected browsers to one of a handful of hard-coded control servers to receive additional instructions, locations to upload data, advertisement feed lists, and domains for future redirects.

The 'Robo Revenge' App Makes It Easy to Sue Robocallers

The 'Robo Revenge' App Makes It Easy to Sue Robocallers

The company has put a $50 million infusion towards building out features that make it not just secure, but accessible to normals .A Clever New App Makes Suing Robocallers a CinchThe good people at DoNotPay have previously automated the arduous processes of fighting parking tickets and canceling subscriptions.

Signal Is Finally Bringing Its Secure Messaging to the Masses

Signal Is Finally Bringing Its Secure Messaging to the Masses

Another new feature it's testing, called "secure value recovery," would let you create an address book of your Signal contacts and store them on a Signal server, rather than simply depend on the contact list from your phone.

Oscars Woes for Netflix, Money for Yahoo Users, and More News

Oscars Woes for Netflix, Money for Yahoo Users, and More News

Yahoo is repenting and Netflix is lamenting, but first: a cartoon about Elon's summer space camp .Here's the news you need to know, in two minutes or less.You can sign up right here to make sure you get the news delivered fresh to your inbox every weekday!

India's Data Protection Bill Threatens Global Cybersecurity

India's Data Protection Bill Threatens Global Cybersecurity

It is in the clear interest of policymakers, organizations, and the public to receive feedback from security researchers directly, instead of risking the information reaching other potentially malicious parties.

Facebook's Bug Bounty Caught a Data-Stealing Spree

Facebook's Bug Bounty Caught a Data-Stealing Spree

Facebook and Twitter also collaborated with Google and Apple on remediation efforts, and the Indiana University researchers won an additional bug bounty award from Google for their findings.

Dashlane's Super Bowl Ad Proves Password Managers Have Arrived

Dashlane's Super Bowl Ad Proves Password Managers Have Arrived

But among the companies coughing up a reported $5.6 million for 30 seconds of Big Game glory is one name most people have never heard of, selling a product that many don’t know exists: Dashlane, an app that manages your passwords.

Windows 7 Gets One Last Update For the Road

Windows 7 Gets One Last Update For the Road

Avast Antivirus Shuts Down Its Shady Data-Selling BusinessKudos this week to Motherboard and PC Mag, who jointly further exposed the shady practices of security company Avast.By the end of the week, Avast had decided to stop collecting and selling user data, and to wind down Jumpshot altogether.

The Fractured Future of Browser Privacy

The Fractured Future of Browser Privacy

That existing model allows companies and advertisers at least some access to marketing data; one argument for preserving it is that if browsers become too restrictive, those parties will pull content from the open web and move it to mobile apps instead.

UK Has a Plan to Corral Huawei. But Security Concerns Linger

UK Has a Plan to Corral Huawei. But Security Concerns Linger

Washington effectively bans carriers from using the company’s equipment in US networks and has long warned that Huawei could build backdoors into its products that could be accessed by the Chinese government, something the company denies it has done or would do.

One Small Fix Would Curb Stingray Surveillance

One Small Fix Would Curb Stingray Surveillance

Stingrays derive their power by pretending to be cell towers, tricking nearby devices into connecting to them instead of the real thing.Without confirming that a cell tower is genuine, devices could wind up connecting to any rogue base station that's set up to broadcast system information messages.

Google Calls Out Safari for Privacy Flaws

Google Calls Out Safari for Privacy Flaws

A Disturbing Look at a Massive Facial Recognition DatabaseThere are really two stories worth reading about Clearview AI, a company that claims to have scraped 3 billion images from the internet—including social media sites—to power an unprecedented facial recognition database.

The Sneaky Simple Malware That Hits Millions of Macs

The Sneaky Simple Malware That Hits Millions of Macs

But given that over 100 million people use macOS, and it hits at least 10 percent of those with Kaspersky installed, it’s reasonable to assume that millions of Mac users deal with it every year.

Trump's ‘National Security’ Impeachment Defense Is a Red Herring

Trump's ‘National Security’ Impeachment Defense Is a Red Herring

Trump’s lawyers are arguing that any attempt by the House impeachment managers and Senate Democrats to force additional testimony by witnesses—particularly people like Bolton—would likely compromise the president’s ability to do his job day-to-day protecting the country.

FBI Takes Down Site With 12 Billion Stolen Records

FBI Takes Down Site With 12 Billion Stolen Records

But the country's high court decided in December that blocking access violated its citizens' rights, and this week it was finally restored.This week Mick Baccio left his post over "differences with campaign leadership over how to manage information security," according to a report in the Wall Street Journal.

Inside the Feds’ Battle Against Huawei

Inside the Feds’ Battle Against Huawei

Meng is chief financial officer of Huawei , the world’s largest manufacturer of telecommunications equipment and second-­largest maker of smartphones.Meng was on her way to Mexico to secure a new beachhead for the next generation of wireless infrastructure, known as 5G .

Windows 10 Has a Security Flaw So Severe the NSA Disclosed It

Windows 10 Has a Security Flaw So Severe the NSA Disclosed It

In fact, Neuberger said that disclosing the code verification bug to Microsoft and the public is part of a new NSA initiative in which the agency will share its vulnerability findings more quickly and more often.

Now It's Really, Truly Time to Give Up Windows 7

Now It's Really, Truly Time to Give Up Windows 7

In a 2013 poll by Spiceworks, 26 percent of respondents projected that they wouldn't migrate away from Windows XP before Microsoft ended support for that operating system in 2014.

The FBI Wants Apple to Unlock iPhones Again

The FBI Wants Apple to Unlock iPhones Again

On the home front, Amazon swatted at money-saving extension Honey just in time for the holidays, warning users that it was a security risk without specifying how.

A Facebook Bug Exposed Anonymous Admins of Pages

A Facebook Bug Exposed Anonymous Admins of Pages

All software has flaws, and Facebook quickly pushed a fix for this one—but not before word got around on message boards like 4chan, where people posted screenshots that doxed the accounts behind prominent pages.

Alleged Spy App ToTok Puts Apple in a Bind

Alleged Spy App ToTok Puts Apple in a Bind

Last month, both Google and Apple removed a popular social messaging app called ToTok from their official app stores.This seems to imply that in reviewing ToTok, Google didn't find anything about the app that violates Play Store policies.

How to Secure Your Wi-Fi Router and Protect Your Home Network

How to Secure Your Wi-Fi Router and Protect Your Home Network

If you're not sure how to find these settings, check the documentation that came with the router, or run a quick web search using your router's make and model.You should be using WPA2 security to guard access to your router, which essentially requires every new device to submit a password to connect.

The Army Bans TikTok

The Army Bans TikTok

In the case of TikTok, that means China, which means government employees are probably right to take extra precautions .China's 'Cloud Hopper' Hacking Campaign Did Even More Damage Than ThoughtA 2018 indictment detailed how China's elite APT10 hackers used access to so-called managed service providers to steal intellectual properly from dozens of companies.

How the US Prepares Its Embassies for Potential Attacks

How the US Prepares Its Embassies for Potential Attacks

The DSS deploys its special agents to almost 300 embassies and consulates globally, in addition to facilities in the United States.

The Decade Big-Money Email Scams Took Over

The Decade Big-Money Email Scams Took Over

"For a long time cybercriminals believed that the money was within the masses," says Crane Hassold, senior director of threat research at the email security firm Agari and former digital behavior analyst for the Federal Bureau of Investigation.