If Apple allows you to add the thumbscan to the access requirement in conjunction with a passphrase then this is moot and I would say go for it. Yes, there’s no doubt that your biometric data may be compromised. If you can live with that possibility then let’s look at another potential problem. If you […]
“At the RSA computer security conference last week, Gary Kenworthy of Cryptography Research held up an iPod Touch on stage and looked over to a TV antenna three meters away. The signal picked up by the antenna, routed through an amplifier and computer software, revealed the secret key being used by an app running on […]
Computer hackers are avenging the Occupy movement by exposing the personal information of police officers who evicted protesters and threatening family-values advocates who led a boycott of an American Muslim television show. In three Internet postings last week, hackers from the loose online coalition called Anonymous published the email and physical addresses, phone numbers and, […]
Hack week in Vegas during the Black Hat and Defcon conferences in Las Vegas last week, researchers wheeled out their best new attacks on everything from browsers to automobiles, demonstrating ingenuity and diligence in circumventing security efforts or in some cases in exploiting systems that were built without security in mind. Here’s a handful of […]
Despite lawsuits, bad publicity, and Adobe’s promise to end their use in Flash, zombie cookies persist and could find a new host in HTML5
For a long time now there has been suspicion that China is a hotbed of hacking activity either endorsed or ignored by the government and targeting foreign individuals, companies, and even governments. The Chinese government has always denied this, but high-profile pull outs such as that threatened by Google last year, demonstrate there is definitely […]
On September 19, 2008, hackers from the Anonymous collective attacked the website of Fox News host Bill O’Reilly. The hackers found and immediately posted e-mail addresses, passwords, and physical addresses of 205 O’Reilly site members paying $5 a month to hear Bill’s wisdom. The next day, a distributed denial of service (DDoS) attack hit the […]
At the USENIX Security Symposium last week, researchers Keaton Mowery, Sarah Meiklejohn and Stefan Savage from the University of California at San Diego presented their paper “Heat of the Moment: Characterizing the Efﬁcacy of Thermal Camera-Based Attacks.”
A German computer engineer said Tuesday that he had deciphered the code used to encrypt most of the world’s mobile Internet traffic and that he planned to publish a guide to prompt global operators to improve their safeguards.
There have been many articles on the web this week suggesting that Apple’s iPhone 4 could be secretly taking pictures of users. I would like to look into these claims and use a little common sense to see if any of this actually makes sense, or if it’s some kind of misunderstanding or joke.
Using three different vulnerabilities and clever exploitation techniques, Irish security researcher Stephen Fewer successfully hacked into a 64-bit Windows 7 (SP1) running Internet Explorer 8 to win this year’s CanSecWest hacker challenge. Fewer (right), a Metasploit developer who specializes in writing Windows exploits, used two different zero-day bugs in IE to get reliable code execution […]