The BBC is reporting that there seems to have been a massive data breach of 200 million Yahoo accounts, with the data – which appears to be from 2012 – being offered for sale for 3 bitcoins ($1805 USD).
If you have started seeing a little red padlock in your Gmail email, don’t freak out, even if the red padlock is open. All that it means is that the sender didn’t use transport layer security (TLS) when sending it – in other words, it simply means that the email was not encrypted when it was sent.
By now you have probably heard about the enormous security flaw that was recently discovered that, experts say, left thousands of applications and devices vulnerable to remote attacks and control. It is a flaw that has been around since 2009, and has the potential to affect any server that is running any post-2008 version of the Gnu C open source library called glibc. It is the function getaddrinfo() within the glibc library that has the flaw, and it is so widely distributed that it is impossible to estimate just how many applications and hardware installs are running the flawed versions (of which there are at least 7 main version and dozens of incremental update versions).
The United States is worrying about something that they consider a new Russian threat: increased Russan submarine activity around the undersea fiber optic cables that carry Internet communications, and the potential that those submarine cables could be severed, crippling U.S. Internet operations. Whether you see this as promoting Russia as a bogeyman, or a real possibility, the reality is that history has demonstrated that undersea Internet cables can be cut, and that it wreaks havoc.
As you may know, last Thursday, October 1st, was the deadline for merchants to be able to accept so-called “chip and PIN” or “chip and signature” smartcard credit cards and debit cards, with the EMV chip. Of course, while the burden is on the merchants to accept them, lots of consumers don’t actually have them, as their banks have not yet issued them a new chipped debit or credit card. Whether you already have your shiny, new chip and PIN or chip and signature card or not, here’s everything that you need to know about them.
Experian, that keeper of your credit information and reputation, has been hacked, and the hackers got away with the personally identifiable information (PII) of 15 million T-Mobile customers and applicants.
In June the U.S. Office of Personnel Management (OPM) revealed that there had been a massive security breach, exposing the personal personnel data of at least 21.5 million government employees. The data included social security numbers, names, and clearance information. What was less well known is that the data also included fingerprint records, and this week it has been revealed that the hackers got 5.6 million fingerprints.
The new Paypal.me service is being hailed as a simpler way to request money, and by Paypal as “the link to getting paid,” but it also turns out to be a great way for scammers to get you to send them money.
Evidence in the form of leaked email demonstrates that Ashley Madison execs knew that their security was weak. A Federal court ruling last week says that the Federal Trade Commission (FTC) can go after companies whose Internet security is weak. Hrrm…
Earlier this year Firefox ramped up its speculative pre-connections ‘feature’ (which some call “predictive preconnections”), so that when you even just hover over a link or thumbnail, Firefox may start preloading certain parts of the linked page (this is different from prefetching). Here’s how to disable it.
Wired’s Joseph Cox has a brilliant idea: what is the best, most readily available consumer device to use to make completely secure calls, and to use for secure text messages and secure chat? (Well, at least as secure and locked down as the average consumer can easily make them?) An iPod Touch! Brilliant! Here’s why.
Last month the U.S. Justice department announced the takedown of the Darkode (get it? DarkCode – Dark Code?) international cybercrime ring, which the DOJ called one of the “gravest threats” to the security of online data. But what exactly does that mean to you, the average user sitting at home behind your computer?
By now you’ve probably heard about Andy Greenberg’s expose in Wired about driving a Jeep while hackers – wireless carjackers – hacked into it. Of course, Internet Patrol readers who read our Can Your Car Be Hacked Through its Onboard Wireless were probably not surprised by this turn of events, because they already knew that the answer to that question was “yes”.