With massive security data breaches happening more and more frequently, there is almost no way to avoid your own personal data being compromised. But what is the likelihood that your compromised data will actually be used for identity theft, fraud, or financial theft? Here’s how it breaks down.
Here is what is going on around the Sony hack tied to Sony’s ‘The Interview’ movie, and the The Interview threat from the Sony hackers. The Interview, with a Christmas release date, sees Seth Rogen and James Franco’s characters going to North Korea to interview North Korean leader Kim Jong Un, and convinced by the CIA to take the opportunity to kill Kim Jong Un. Ahead of its release, hackers hacked into Sony, grabbed all sorts of private employee and corporate data, including copies of the movie and other unreleased movies including Annie, Mr. Turner, Fury, and Still Alice, and then issued the following threat, including allusions to 9/11.
Early today the Senate declassified and made public the Senate Select Committee Study of the Central Intelligence Agency’s Detention and Interrogation Program (or, as some are calling it, the Bush Cheney CIA Torture Report). We know that many of you will be looking for the CIA torture methods report online, and so, we are giving it to you here.
Microsoft has released a critical update to patch a “privately reported” Microsoft Secure Channel (“Schannel”) vulnerability which affects all current versions of Windows and Windows Server. Says Microsoft, “This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows.”
Outlets such as the Daily Dot and Life Hacker are reporting the leaking of five million Gmail addresses and passwords on a Russian Bitcoin forum.
If you are anywhere on social media today (Facebook, Twitter, etc.), you may be wondering why suddenly everybody is talking about nude celebrity photos and nude selfies. This is because, apparently, there was a massive hacking of iCloud accounts – including those of celebrities who, apparently, had naked pictures of themselves stored on Apple’s iCloud servers.
4.5 million patient records at hospitals across the United States have been hacked, and their personal data stolen. Community Health System (also known as CHS and CHS.net) is a network of 206 hospitals across the U.S., operating under different names, in Alabama, Alaska, Arizona, Arkansas, California, Florida, Georgia, Illinois, Indiana, Kentucky, Louisiana, Mississippi, Missouri, New Jersey, New Mexico, Nevada, North Carolina, Ohio, Oklahoma, Oregon, Pennsylvania, South Carolina, Tennessee, Texas, Utah, Virginia, Washington, West Virginia, and Wyoming.
A new report released by Internet security firm Symantec highlights the security risks of personal and wearable tracking devices such as the FitBit, and even self-tracking apps such as Runkeeper, Runtastic, and MapMyRun. In our efforts to track and quantify our every move (what Symantec calls the “Quantified Self” movement), we are generating an unbelievable amount of data, including location data, that can be used to profile us, track our location, and even to steal our identity.
That USB thumbdrive or flash drive that you have in your pocket may be a vector for all kinds of malware in the firmware, and once infected it cannot be fixed. In fact that’s true of any USB device, not just thumb drives. That’s the conclusion that Jakob Lell and Karsten Nohl, security researchers who have developed BadUSB, have reached.
A lightbulb as a port of entry for a hacker to steal your wifi password? Yes! Specifically the LIFX smart lightbulbs, but it could be any smart bulb, or for that matter any other “smart” thing connected to that Internet of things.
“The Internet of Things”, often shortened to the “IoT”, is a phrase that is becoming more and more common. But just what is the Internet of Things? Who coined the IoT, and just what are these “things”? We explain.
Email Privacy Tester is exactly what it says – a way to test your email program for privacy and security leaks. And it’s free!
You may have heard about NPR’s Steve Henn’s experiment he calls “Project Eavesdrop”, to simulate and determine what information the NSA can get from your data, and, if so, you may be wondering what a “Pone Plug” is. That is, of course, one of the drawbacks to radio – you hear something, and it isn’t at all how it sounds. It’s not a “Porn Plug” either. It’s a Pwn Plug, sold by Pwnie Express.