security

Broken Android factory reset leaves critical data intact

Broken Android factory reset leaves critical data intact

Factory reset or wipe is often used not just to start fresh but to also as a necessary step when selling a used Android device. Well, that's the theory anyway. Researchers from Cambridge University claim that they are just that: theories. Unfortunately, in practice, that might not be completely the case. Their tinkering of 21 smartphones from five manufacturers, all running Android versions 2.3 t 4.3, showed that factory wipe actually leaves some data locations intact. Worse, some of these locations are the very places that store credentials and encryptions keys that are supposed to be private and safeguarded.

Continue Reading

Researchers design new Tor client resistant to NSA attacks

Researchers design new Tor client resistant to NSA attacks

Internet anonymity has become difficult to procure as the NSA is doing everything in its power to keep tabs on Internet activity. One way that people have been protecting their anonymity is by using the anonymizing network, Tor. It was popularly used to access dark web sites like Silk Road, but it can also be used for good. For example, people in certain countries without free speech protections could be jailed or worse for disparaging online claims against the government; Tor provides a way to prevent those users' web activity from being tracked. As it turns out, Tor isn't as safe from the prying eyes of big government surveillance as we once thought.

Continue Reading

Apple Store app gets 2-step verification, Touch ID security

Apple Store app gets 2-step verification, Touch ID security

Considering the mess it found itself in over the iCloud fiasco, Apple could not but help hunker down on its security measures. Aside from data encryption and Touch ID, which is advertised to be both secure and convenient, Cupertino has also started enabling stronger two-factor authentication across its services. It's exactly these latter two features that have now just landed on the iOS app for the Apple Store in order to make sure that even physical purchases are just as secure as digital ones.

Continue Reading

CareFirst health insurer hacked: up to 1.1m customers affected

CareFirst health insurer hacked: up to 1.1m customers affected

Recently we reported that the number of health care providers that have suffered some sort of breach sit at the 90-percent mark (over the last two years), and though some have taken steps to protect their networks, many are still vulnerable. Today it was announced that the health insurer CareFirst had been breached, making it the third in the United States to suffer such an attack (or, at least, to disclose as much). The attack took place in June of last year, and is said to have been sophisticated, affecting up to 1.1 million of the insurer’s customers. The company is based in Maryland but services the Washington DC region.

Continue Reading

High schooler hits entire school district with week-long cyberattack

High schooler hits entire school district with week-long cyberattack

Teenagers regularly make poor decisions when it comes to technology, and too many of them in recent times involve swatting pranks. This latest episode of poor teenage judgement comes in the form of an alleged cyberattack, however, and now that high school student is facing a possible felony charge, according to KTVB. The unnamed 17-year-old is said to have instituted a DDoS attack against the West Ada school district in Idaho — it’s the largest school district in the state, and for one miserable week students and faculty across dozens of schools suffered because of it.

Continue Reading

Experts say researcher’s in-flight hacking claims are dubious

Experts say researcher’s in-flight hacking claims are dubious

Making headlines yesterday, security researcher Chris Roberts is being investigated by the FBI for claiming the ability to mess with a plane's flight systems from onboard. An ill-received tweet started it all, as Roberts claimed he could hack his flight's oxygen regulation. Roberts went on to tell the FBI that he hacked en-route 15 to 20 times over the several years using his laptop, modified cables, and the in-flight entertainment systems. He even claimed to be able to access engine commands and make his plane move sideways. Industry experts are calling Roberts out on his claims, citing a range of reasons why his claims are dubious, if not impossible.

Continue Reading

Flare: an all-in-one home security system shaped like a UFO

Flare: an all-in-one home security system shaped like a UFO

You're away from home and though you've a housesitter to keep the planets from dying, the place sits empty night after night and you've no way to know whether ne'erdowells will stay away. There are various smart home security systems on the market that offer peace of mind, mostly through connected alerts and access to video feeds. They typically involve placing sensors around the house, however, something the maker behind Flare decided to avoid. With Flare, the entire home security setup is promised to be available in a single UFO-shaped device.

Continue Reading

The simple Smart Home: Where to start

The simple Smart Home: Where to start

Controlling lights, appliances, and keeping an eye on home security has never been easier, but as smart home technology proliferates, picking the best place to start can be tough. I’ve been upgrading my apartment for the past few years, now, and I know that the first step needn’t be too risky, however. Since home automation can be intimidating, I’m going to focus on products that require the minimum of installation effort. I’m a big fan of non-permanent options: it makes a lot of sense if you’re renting, but it also gives you flexibility to change things up as you get used to your newly-smart home.

Continue Reading

Penn State says it was hit with pair of “sophisticated” cyber attacks

Penn State says it was hit with pair of “sophisticated” cyber attacks

Penn State has revealed that it was hit with two major cyber attacks, one of which it determined originated from China. The announcement was made today, with the university saying that it first became aware of the threats on November 21, 2014 after being alerted by the FBI. According to the statement, the FBI alerted the university of a cyber attack taking place on its College of Engineering network. The university is saying that “advanced persistent threat actors” conducted the two cyber attacks, with “at least” one being based in China. The oldest discovered date of intrusion was September of 2012.

Continue Reading

1 2 3 4 5 Next