On February 26th the Federal Communications Commission voted in favor of stronger net neutrality rules. The vote reclassifies both wired and wireless broadband internet service providers (ISPs) as utilities under Title II of the Communications Act of 1934. Most of the media attention has focused on the ruling barring ISPs from blocking or prioritizing… Read More »
Android & PC Tie For First Place In Malware
A report published last week by Alcatel-Lucent revealed malware on mobile devices has caught up to the infection rate on traditional PCs. The report was created by the telecommunications company’s Motive Security Labs and used data compiled from fixed and mobile networks using their Motive Security Guardian software. The software is deployed in networks around… Read More »
What Are Drone Operators All Waiting For?
Last week I talked about drone operators who don’t follow the rules. This week I’ll talk about legal drones, existing regulations and the new rules that are due out soon. Commercial Use Current FAA regulations prohibit the commercial use of drones, but companies can apply for a special permit. According to Reuters, as of February… Read More »
How Can We Prevent The Next White House Drone Crash?
Current Federal Aviation Administration regulations require civilian drones to stay under 400 feet in altitude and at least five miles from airports and other restricted areas. Unfortunately, not all drone operators follow the regulations. Drones at the White House On Monday, January 26th at 3:02 AM a Secret Service officer on duty at the White House… Read More »
My Phone Is Held Hostage By Ransomware, Now What?
Ransomware is a type of malware that holds your data hostage. It has been a problem with computers for many years, but it’s only recently started showing up on mobile devices. When you activate the program or app, it blocks you from accessing the data on the device and displays a message demanding payment by… Read More »
Can The FBI Attract Ethical Hackers?
In today’s online world, cyber attacks can be nearly as devastating as traditional warfare. In addition to cyber terrorism, hackers have stolen identification and credit card information from millions of Americans in cyber attacks on large businesses. Local law enforcement often doesn’t have the skills or manpower to handle these cyber crimes, and jurisdiction becomes… Read More »
FBI Officially Names North Korea as Source of Sony Hack
To the surprise of practically no one, the Federal Bureau of Investigation has officially announced the involvement of the North Korean government in last month’s hack on Sony Pictures Entertainment. While the FBI announcement stated it could not list all of the reasons for the link due to the need to protect “sensitive sources and… Read More »
Dirtboxes – Cellular Spies in the Sky
Last week the Wall Street Journal broke a story on cellular spying that has troublesome implications for wireless security experts and privacy advocates. According to anonymous sources cited by the paper, the United States government is mounting devices known as dirtboxes on small planes and using them to sweep up cell phone data on innocent… Read More »
- « Previous Page
- 1
- …
- 3
- 4
- 5
- 6
- 7
- Next Page »