Posted October 29, 2012 She’s got a right to be incensed, with 77% of the state’s population’s Social Security numbers being snatched out from under the Department of Revenue. But what’s the appropriate penalty for the department, for the crime of leaving the data unprotected? Read the full story on Naked Security.
Posted October 11, 2012 Nude photos allegedly of the star began circulating soon after his laptop and camera were stolen. Clicking on such files is always a bad idea, given that malware loves to piggyback on celebrity news. Besides, as any true Belieber knows, Justin has an outie. Read the full story on Naked Security.
Posted August 28, 2012 Over $9 million was stolen from cash machines in 280 cities around the world in less than 12 hours, using a mixture of a gang of low-level operatives and high-tech hacking. Read more here.
Posted August 23, 2012 Back up, encrypt, and beware, since your data and your gadgets are sitting ducks when they’re in the repair shop, a recent bad-Apple store story reminds us. For more Apple Store shenanigans, read the story here.
Posted June 14, 2012 A recently published Freedom of Information Act (FOI) request has revealed that in at least one case, the US police’s hunt for online child pornographers has been hindered by Tor. Here’s the article.
Posted June 8, 2012 Interest in a free, encrypted web chat service called Cryptocat has spiked following the detainment and interrogation of its developer at the US border. Here’s the story on Naked Security.
Posted January 12, 2012 George Fried,an, CEO of Stratfor, came forth with a public statement explaining what happened in the attacks against his company last December. He admitted fault, took responsibility and accused Anonymous of censorship that doesn’t come openly from governments, but rather from people hiding behind masks. I like Stratfor’s approach to owning […]
Posted January 4, 2012 A professor at Utah Valley University analyzed the leaked password hashes stolen by Anonymous from security firm Stratfor and determined even their security-minded customers choose weak passwords. Here’s the story on Naked Security.