Last week, I wrote about how weak printer security remains in general. I included a few tips but I do not know if the message got through. Users still tend to think of printers as dumb USB or wireless devices. Modern printers are powerful computers in their own right and when you connect that to… Read More »
Did Pokemon Just Save Augmented Reality?
It’s been a wild ride for Nintendo over the last few weeks. Amid a weak quarter of hardware sales, Pokemon Go was released and quickly became the most downloaded new game in App Store history. Nintendo stock shot up breaking the Tokyo record this century but then quickly settled back down as soon as investors realized Nintendo only owns 32%… Read More »
Railway Disasters And Their Distracted Operators
Railway Disasters And Their Distracted Operators The February rail crash in Bavaria killing 11 was not an isolated incident. In fact, railway accidents are on the rise for several reasons. Some blame old railways and loose spikes for derailments. Others will point to antiquated safety signaling systems or lack of Positive Train Control (PTC). But the… Read More »
Drone Hacking Taken To New Heights
Hacking Over the Internet, Wirelessly, and From the AirHacking is achieved in many forms. One might think of hackers breaking into computer networks remotely over the internet to shut down critical infrastructure. This has been proven out with the Stuxnet hacking of Iran’s nuclear reactor where it suffered a major blow when the U.S. and Israel… Read More »
Law Enforcement Must “Immediately Destroy” Collateral Data Collected
Privacy advocates recently won a victory against the unrestricted use of “stingray” cell-site emulators. On November 9th, Illinois judge Iain D. Johnston ruled law enforcement agencies must take steps to minimize the impact on innocent bystanders caught up in the stingray surveillance dragnet and that law enforcement must “immediately destroy” collateral data collected. So how is… Read More »
Why Are So Many Prison Calls Being Recorded and Stored?
On November 11th an anonymous hacker leaked records of more than 70 million calls stolen from Securus Technologies. Securus provides phone service to land line phones in jails and prisons across the country, covering 1.2 million inmates. The Intercept examined 37 gigabytes of leaked data and found it consisted of databases that included the prisoners’… Read More »
Is FAA Registration Closing the Hangar Door After the Drone Has Already Launched?
The Federal Aviation Administration announced last week that it will soon start requiring civilian drone owners to register their aircraft. Current regulations for commercial drones already require FAA registration and a pilot’s license for the operator, so this decision will mostly impact recreational drone owners, hobbyists and startup businesses not yet licensed to fly commercially… Read More »
Stagefright Bug Takes Center Stage On 950 Million Android Devices
A series of bugs and security loopholes in the Android operating system could allow hackers to take control of up to 95% of Android smartphones simply by sending an MMS message with malware attached. What is the Stagefright bug? Stagefright is the name of the Android operating system’s media library, which the bug is named… Read More »
- 1
- 2
- 3
- 4
- Next Page »