My Friend Cayla Doll, Other Toys, Hackers’ Delight and Parents’ Nightmare

If your child, or someone you know, received a My Friend Cayla doll, a Furby Connect doll, a Q50 children’s smartwatch, or a Sphero BB-8 droid (or quite likely one of a number of other toys or devices aimed at children, and that connect to the Internet via Bluetooth), that device – and thus the child who plays with it or uses it – is at risk of being hacked, personal data stolen, and even a hacker talking to the child, all because of unsecure Bluetooth connections.

ISIS Calls Anonymous ‘Idiots’ as Anonymous Declares War on ISIS

The hacker group known as Anonymous has declared cyber war on ISIS (the Islamic State, which also goes by ISIL and Daesh). While Anonymous has actually stated this previously, they have stepped up their game, and their public announcements of this war on ISIS, following last Friday’s attacks in Paris. In response to the announcement, ISIS released their own statement, calling Anonymous “idiots”.

Government Personnel Data Breach Included 5.6 Million Fingerprint Records

In June the U.S. Office of Personnel Management (OPM) revealed that there had been a massive security breach, exposing the personal personnel data of at least 21.5 million government employees. The data included social security numbers, names, and clearance information. What was less well known is that the data also included fingerprint records, and this week it has been revealed that the hackers got 5.6 million fingerprints.

Update on Ashley Madison Hack and Data Dump

As we told our readers last month, the ‘have an affair and cheat on your spouse’ website Ashley Madison was hacked, and information on their “37,765,000 anonymous users” was grabbed by the hackers, who call themselves The Impact Team. Now the Impact Team has dumped and revealed all of the data online, and many people are worrying “Is my email address in the Ashley Madison data?”

About the Jeep Hack and Hackers Hacking Cars and What to Do About It

By now you’ve probably heard about Andy Greenberg’s expose in Wired about driving a Jeep while hackers – wireless carjackers – hacked into it. Of course, Internet Patrol readers who read our Can Your Car Be Hacked Through its Onboard Wireless were probably not surprised by this turn of events, because they already knew that the answer to that question was “yes”.

Sony Movie “The Interview” Hack and Terror Threat Explained

Here is what is going on around the Sony hack tied to Sony’s ‘The Interview’ movie, and the The Interview threat from the Sony hackers. The Interview, with a Christmas release date, sees Seth Rogen and James Franco’s characters going to North Korea to interview North Korean leader Kim Jong Un, and convinced by the CIA to take the opportunity to kill Kim Jong Un. Ahead of its release, hackers hacked into Sony, grabbed all sorts of private employee and corporate data, including copies of the movie and other unreleased movies including Annie, Mr. Turner, Fury, and Still Alice, and then issued the following threat, including allusions to 9/11.

4.5 Million Hospital Records Hacked Across the U.S. – Complete List Here

4.5 million patient records at hospitals across the United States have been hacked, and their personal data stolen. Community Health System (also known as CHS and CHS.net) is a network of 206 hospitals across the U.S., operating under different names, in Alabama, Alaska, Arizona, Arkansas, California, Florida, Georgia, Illinois, Indiana, Kentucky, Louisiana, Mississippi, Missouri, New Jersey, New Mexico, Nevada, North Carolina, Ohio, Oklahoma, Oregon, Pennsylvania, South Carolina, Tennessee, Texas, Utah, Virginia, Washington, West Virginia, and Wyoming.

Apple Fingerprint Recognition Scanner Technology on the iPhone Already Cracked – But Does it Really Matter?

Mere days after Apple released the iPhone 5s, with its new “Touch ID” fingerprint identity sensor scanner, the Chaos Computer Club announced that it had “successfully bypassed the biometric security of Apple’s TouchID using easy everyday means”. But does this mean the fingerprint recognition technology is useless? We say not.