The United States is worrying about something that they consider a new Russian threat: increased Russan submarine activity around the undersea fiber optic cables that carry Internet communications, and the potential that those submarine cables could be severed, crippling U.S. Internet operations. Whether you see this as promoting Russia as a bogeyman, or a real possibility, the reality is that history has demonstrated that undersea Internet cables can be cut, and that it wreaks havoc.
As you may know, last Thursday, October 1st, was the deadline for merchants to be able to accept so-called “chip and PIN” or “chip and signature” smartcard credit cards and debit cards, with the EMV chip. Of course, while the burden is on the merchants to accept them, lots of consumers don’t actually have them, as their banks have not yet issued them a new chipped debit or credit card. Whether you already have your shiny, new chip and PIN or chip and signature card or not, here’s everything that you need to know about them.
Experian, that keeper of your credit information and reputation, has been hacked, and the hackers got away with the personally identifiable information (PII) of 15 million T-Mobile customers and applicants.
In June the U.S. Office of Personnel Management (OPM) revealed that there had been a massive security breach, exposing the personal personnel data of at least 21.5 million government employees. The data included social security numbers, names, and clearance information. What was less well known is that the data also included fingerprint records, and this week it has been revealed that the hackers got 5.6 million fingerprints.
The new Paypal.me service is being hailed as a simpler way to request money, and by Paypal as “the link to getting paid,” but it also turns out to be a great way for scammers to get you to send them money.
Evidence in the form of leaked email demonstrates that Ashley Madison execs knew that their security was weak. A Federal court ruling last week says that the Federal Trade Commission (FTC) can go after companies whose Internet security is weak. Hrrm…
Earlier this year Firefox ramped up its speculative pre-connections ‘feature’ (which some call “predictive preconnections”), so that when you even just hover over a link or thumbnail, Firefox may start preloading certain parts of the linked page (this is different from prefetching). Here’s how to disable it.
Wired’s Joseph Cox has a brilliant idea: what is the best, most readily available consumer device to use to make completely secure calls, and to use for secure text messages and secure chat? (Well, at least as secure and locked down as the average consumer can easily make them?) An iPod Touch! Brilliant! Here’s why.
Last month the U.S. Justice department announced the takedown of the Darkode (get it? DarkCode – Dark Code?) international cybercrime ring, which the DOJ called one of the “gravest threats” to the security of online data. But what exactly does that mean to you, the average user sitting at home behind your computer?
By now you’ve probably heard about Andy Greenberg’s expose in Wired about driving a Jeep while hackers – wireless carjackers – hacked into it. Of course, Internet Patrol readers who read our Can Your Car Be Hacked Through its Onboard Wireless were probably not surprised by this turn of events, because they already knew that the answer to that question was “yes”.
Both the Federal Senate Judiciary Committee and the Senate Intelligence Committee heard today from FBI Director James Comey, and from Deputy Attorney General Sally Quillian Yates, that they need a backdoor (or a “front door”, as Comey calls it) that allows them to decrypt encrypted email and messages in order to fight terrorism.
Hyatt Hotels, owners of among others the Hyatt Regency brand, has quietly announced that their Hyatt Gold Passport system has been hacked.
The Dyre Wolf phishing malware targets primarily businesses and organizations (rather than individuals). This is because it tricks the victim into giving up bank credentials, and then does a wire transfer. However it works by tricking individuals using social engineering, which is also how it gets around 2 factor authentication (2FA). Dyre Wolf is distinct from the dire wolf – Dyre Wolf is phishing malware, the dire wolf is an extinct member of the wolf family (and the direwolf is a mythical dire wolf featured in Game of Thrones).