Since spring of 2014, Rutgers has been targeted by a hacker or group of hackers in a series of distributed denial of service (DDoS) attacks. A DDoS attack uses a network of compromised computers called a botnet to access the targeted site simultaneously. The increase in traffic overwhelms the targeted network and causes it to… Read More »
How Can Military Drones Be So Vulnerable to Hacking Attacks?
United States military and intelligence agencies are increasingly relying on unmanned aerial vehicles but these military drones have long been an attractive target for hackers. And lately, it seems as though the hackers are gaining entrance more easily. How is this possible? In 2011 a CIA drone was captured by Iranian hackers who managed to… Read More »
Is FAA Registration Closing the Hangar Door After the Drone Has Already Launched?
The Federal Aviation Administration announced last week that it will soon start requiring civilian drone owners to register their aircraft. Current regulations for commercial drones already require FAA registration and a pilot’s license for the operator, so this decision will mostly impact recreational drone owners, hobbyists and startup businesses not yet licensed to fly commercially… Read More »
What’s The Best Way To Steal Credit Info? Hack A Credit Processing Company Like Experian
On October 1st T-Mobile released a statement revealing approximately 15 million existing and potential customers had their personal identification data stolen. The hack was not against T-Mobile itself but against Experian, the company that runs credit verification for postpaid accounts for T-Mobile. What Was Stolen? According to T-Mobile, anyone who submitted a credit application between… Read More »
Low-Cost Cell Phone Detector Interesting Side Effect
Low-Cost Cell Phone Detectors Have Interesting Side Effect: They Help Protect Your Privacy Monitoring a suspect’s phone calls is an essential part of many criminal investigations, but tapping a wireless or landline phone requires a court order. Now law enforcement agencies have another option for keeping tabs on wireless phones that may not necessitate going… Read More »
Why Non-Cheaters Should Be Just As Worried As Ashley Madison Members
Millions of accounts stolen from the adultery facilitation service Ashley Madison hit the dark web this week, causing angst for spouses, anxiety for the site’s users and social reflection from a variety of media sources. The information includes names, passwords, email addresses, credit card information for paid accounts, physical descriptions and profile information about users’… Read More »
Black Hat Conference Highlights
Last week cyber security experts gathered at the Mandalay Bay hotel in Las Vegas for the 9th annual Black Hat conference. While the major media focus was on the connected car vulnerabilities I discussed in a previous post, there were many other important subjects covered. Let’s look at some of the highlights. Android Fingerprint Sensor… Read More »
Stagefright Bug Takes Center Stage On 950 Million Android Devices
A series of bugs and security loopholes in the Android operating system could allow hackers to take control of up to 95% of Android smartphones simply by sending an MMS message with malware attached. What is the Stagefright bug? Stagefright is the name of the Android operating system’s media library, which the bug is named… Read More »
- « Previous Page
- 1
- …
- 11
- 12
- 13
- 14
- 15
- …
- 22
- Next Page »