The Segway has a mobile app. It is hackable: While analyzing the communication between the app and the Segway scooter itself, Kilbride noticed that a user PIN number meant to protect the Bluetooth communication from unauthorized access wasn't being used for authentication at every level of the system. As a result, Kilbride could send arbitrary commands to the scooter without...
The press is reporting a $32M theft of the cryptocurrency Ethereum. Like all such thefts, they're not a result of a cryptographic failure in the currencies, but instead a software vulnerability in the software surrounding the currency -- in this case, digital wallets. This is the second Ethereum hack this week. The first tricked people in sending their Ethereum to...
A total of eight Apple iOS security flaws were discovered by a single researcher.
Tor wants to find bugs which could compromise the identity of its users.
The cryptocurrency has been dealt another serious blow with the second high-profile theft of the week.
The lead prosecutor said the Russian man had cooperated with the US government "from the start."
Slashdot asks if password masking -- replacing password characters with asterisks as you type them -- is on the way out. I don't know if that's true, but I would be happy to see it go. Shoulder surfing, the threat is defends against, is largely nonexistent. And it is becoming harder to type in passwords on small screens and annoying...
The company hopes that security orchestration and automation will bring in future enterprise revenue.
The company appears to have ignored the security report, months after it was filed.
It's about to get really difficult to accidentally fall for a phishing attack.
Humble Bundle is selling a bunch of cybersecurity books very cheaply. You can get copies of Applied Cryptography, Secrets and Lies, and Cryptography Engineering -- and also Ross Anderson's Security Engineering, Adam Shostack's Threat Modeling, and many others. This is the cheapest you'll ever see these books. And they're all DRM-free....
The hack took only a few minutes but allowed the criminal to escape with millions in investor funds.
News from Australia: Under the law, internet companies would have the same obligations telephone companies do to help law enforcement agencies, Prime Minister Malcolm Turnbull said. Law enforcement agencies would need warrants to access the communications. "We've got a real problem in that the law enforcement agencies are increasingly unable to find out what terrorists and drug traffickers and pedophile...
Whether or not former users of the affairs website will take up the offer, however, is up for debate.
They're rare: The one Dubielzig really wants is an eye from a giant squid, which has the biggest eye of any living animal -- it's the size of a dinner plate. "But there are no intact specimens of giant squid eyes, only rotten specimens that have been beached," he says. As usual, you can also use this squid post to...
There are two opposing models of how the Internet has changed protest movements. The first is that the Internet has made protesters mightier than ever. This comes from the successful revolutions in Tunisia (2010-11), Egypt (2011), and Ukraine (2013). The second is that it has made them more ineffectual. Derided as "slacktivism" or "clicktivism," the ease of action without commitment...
The government just doxed several concerned (and angry) citizens.
Congress allowed the government to scan faces of foreign nationals to keep track of visa overstays. But now that's set to be extended to Americans, worrying some privacy advocates.
A set of documents in Pakistan were detected as forgeries because their fonts were not in circulation at the time the documents were dated....
To be safe, you must change your Verizon PIN.