How much do you know about cybersecurity?

Posted by & filed under Cyber Security.

Test your knowledge on cybersecurity topics and terms by taking our 10-question quiz. Then see how you did in comparison with a nationally representative group of 1,055 randomly selected adult internet users surveyed online between June 17 and June 27, 2016. The survey was conducted by the GfK Group using KnowledgePanel. When you finish, you… Read more »

WikiLeaks Reveals How the CIA Can Hack a Mac’s Hidden Code

Posted by & filed under Apple, Civil Liberties, Cyber Security, Electronic Surveillance.

IF THE CIA wants inside your Mac, it may not be enough that you so carefully avoided those infected email attachments or maliciously crafted web sites designed to plant spyware on your machine. Based on new documents in WikiLeaks’ ongoing release of CIA hacking secrets, if Langley’s hackers got physical access, they still could have… Read more »

Smart machines v hackers: How cyber warfare is escalating

Posted by & filed under AI/Artificial Intelligence, Cyber Security, Emerging Technologies.

There is a gaping hole in the digital defences that companies use to keep out cyber thieves. The hole is the global shortage of skilled staff that keeps security hardware running, analyses threats and kicks out intruders.  Currently, the global security industry is lacking about one million trained workers, suggests research by ISC2 – the industry… Read more »

WikiLeaks Releases Trove of Alleged C.I.A. Hacking Documents

Posted by & filed under Cyber Security, Electronic Surveillance, Ethical issues, IT and Politics, IT Security.

Wikileaks recently released thousands of documents that it said described sophisticated software tools used by the CIA to break into smartphones, computers and even Internet-connected televisions. Source: New York Times Date: March 7th, 2017 Link: https://www.nytimes.com/2017/03/07/world/europe/wikileaks-cia-hacking.html?action=Click&contentCollection=BreakingNews&contentID=64996424&pgtype=Homepage&smid=fb-nytpolitics&smtyp=cur&_r=0 Discussion 1) “The WikiLeaks release said that the CIA has managed to bypass encryption on popular phone and messaging services.”  Does this… Read more »

Dropbox Didn’t Actually Delete Your ‘Deleted’ Files

Posted by & filed under Cloud Computing, Cyber Security, Ethical issues, Privacy.

Dropbox recently restored years-old “deleted” files for some customer accounts by accident, drawing attention to a potential privacy problem.  Files supposedly deleted by customers from the company’s servers were instead retained for as long as eight years, according to several reports over the past few weeks. The company apologized for what it has described as… Read more »

The Dumb ‘Smart’ Gear That Someone’s Gonna Hack in 2017

Posted by & filed under Consumer Technology, Cyber Security.

A collaboration between beauty company L’Oreal and generally solid tech upstart Withings, this Wi-Fi hair brush (yes, you read that correctly) has an onboard microphone (again, yep) that listens to hair as you brush to identify hair issues. Simultaneously, various sensors count brush strokes, measure brushing patterns, and determine how much pressure you’re applying to your… Read more »

Yahoo: How do state hackers break in?

Posted by & filed under China, Cyber Security, IT Security.

Yahoo has revealed that login details for up to one billion accounts have gone missing.  The massive breach was discovered while it investigated a separate attack that had compromised data on about 500 million accounts. Yahoo said it suspected a state-sponsored attacker was involved in both thefts.  How can it be sure? Source: BBC Technology News Date: December… Read more »

Hackers hit San Francisco transport systems

Posted by & filed under Bitcoin, Cyber Security, Fraud, IT Security.

San Francisco’s transport agency has been hit by a hack attack that led to customers being able to travel for nothing. The hackers have made a ransom demand of 100 Bitcoin, which amounts to about $70,000 (£56,000 ; €66,000).  As a precaution, staff shut off all ticketing machines on the network. Source: BBC Technology News Date: November 29th,… Read more »

Deutsche Telekom fault affects 900,000 customers

Posted by & filed under Consumer Technology, Cyber Security, DoS/Denial of Service, IT Security.

Deutsche Telekom has confirmed up to 900,000 customers have had their broadband service cut off following a possible hack of its hardware.  Internet access, phone connections and TV reception for those with a certain router have been affected. Source: BBC Technology News Date: November 29th, 2016 Link: http://www.bbc.com/news/technology-38130352 Discussion 1) Is there anything you could do if you… Read more »

Tech firms seek to frustrate UK internet history log law

Posted by & filed under Civil Liberties, Cyber Security, Emerging Technologies, Ethical issues.

Plans to keep a record of UK citizens’ online activities face a challenge from tech firms seeking to offer ways to hide people’s browser histories.  Internet providers will soon be required to record which services their customers’ devices connect to – including websites and messaging apps.  The Home Office (the UK department responsible for the… Read more »