Spies’ use of cellphone surveillance technology suspended in January, pending review

Posted by & filed under Cybersecurity.

When a crippling ransomware attack wreaked havoc on computers around the world earlier this year, it did so with alarming, worm-like speed. It didn’t take long for security researchers to find out why. The highly sophisticated code that was used to sneak silently into computers, largely undetected, had been stolen from the NSA. The incident thrust a… Read more »

How to beat security threats to ‘internet of things’

Posted by & filed under Cybersecurity, Internet of Things.

The “internet of things” is all about connecting objects to a network and enabling them to collect and share data. Household objects like thermostats, light switches, doorbells, washing machines, fridges and even toys can all be connected via wi-fi and controlled remotely. But how safe are your home appliances from hacking? Source: BBC Technology News Date: May 25th, 2017… Read more »

Deciding when to pay up: How to respond to hackers in ransomware attack

Posted by & filed under bitcoin, Cyber attack, Cybersecurity.

Cambrian College in Sudbury, Ont., has managed to regain control of most of its computer system after hackers infected the network last Thursday with a virus, and demanded electronic money in the form of 30 bitcoins, which is equivalent to approximately $54,000. Although the administration claims it has not given in to the ransom demands… Read more »

Smartphone fingerprint sensors may not be as secure as you think

Posted by & filed under App Economy, Cybersecurity, Electronic Surveillance.

New research suggests that smartphones can be easily fooled by fake fingerprints that have been digitally composed. Source: New York Times Date: April 25th, 2017 Link: https://www.thestar.com/business/tech_news/2017/04/11/smartphone-fingerprint-sensors-may-not-be-as-secure-as-you-think.html Discussion 1) Biometrics has been touted as a very secure way to ensure the security of technology.  What could we do better now that we know fingerprints are so easily falsifiable?… Read more »

Mobile phone motion sensors can be used to crack your PIN

Posted by & filed under Cybersecurity, Emerging Technologies, IT and Politics.

A new study has revealed just how easy it is for hackers to use the sensors in mobile devices to crack four-digit PINs and to access a wide variety of other information about users. Cyber-security experts from Newcastle University in the U.K. found that once a mobile user visits a website, code embedded on the page could then use… Read more »

Investigation found Ohio inmates built and hid computers in prison

Posted by & filed under Cybersecurity.

Lax security allowed inmates at an Ohio prison to build two computers and connect them to the state’s Department of Rehabilitation and Correction’s network, investigators found. Source: CNN Date: April 13th, 2017 Link: http://us.cnn.com/2017/04/12/us/ohio-jail-computers-trnd/index.html Discussion 1) What steps could the Ohio Department of Rehabilitation and Correction have taken to find network traffic they weren’t expecting on their network?… Read more »

Investigative reporter for CBS News continues to fight government electronic surveillance

Posted by & filed under Censorship, Civil Liberties, Cyberforensics, Cybersecurity, Electronic Surveillance, IT and Politics.

As an investigative reporter for CBS News, Ms. Attkisson was responsible for investigating and reporting on national news stories. Between 2011 and 2013, she investigated and prepared various high-profile news reports, including ones related to the “Fast and Furious” “gunwalking” operation and the attack on the American diplomatic mission in Benghazi, Libya… In 2011——at the… Read more »

Smart TV hack embeds attack code into broadcast signal—no access required

Posted by & filed under Cyber attack, Cybersecurity, Ethical Issues.

A new attack that uses terrestrial radio signals to hack a wide range of Smart TVs raises an unsettling prospect—the ability of hackers to take complete control of a large number of sets at once without having physical access to any of them. The proof-of-concept exploit uses a low-cost transmitter to embed malicious commands into… Read more »