Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


World’s first and oldest cybercrime (1830) predates electrical telegraphy.  Read how two French bond traders hacked France’s military semaphore telegraph.

Forget VPNfilter – here’s BACKLASH, a networking hack from way, way back

With a name like BACKLASH, you might think this hack comes from the era of mechanical devices, with gears and pulleys. You’d be right!


A pair of ...

Continue Reading →
0

Where Does Cell Phone Location Data Go?

Have you ever wondered what happens to the location information your smartphone is collecting about you?  Who has access to that information, and for what purpose?  As it turns out, as told in a recent report by Brian Krebs, this information is available to pretty much anybody.

A related article in Sophos’ Naked Security blog pointed to a Continue Reading →

0

How Secure Are Mobile Payment Apps Anyway?

The latest trend in the card payment universe are the mobile payment apps that let you use a smart watch or smartphone in place of a credit card.  Just how secure are these payment systems?  One of my regular readers, Eric Morley, owner of Big Frog Custom T-Shirts in Woodbury, MN, asked me that question via LinkedIn, and I thought it was a great idea for an article.  ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Microsoft inches closer to commercially-viable quantum computing

Microsoft’s quest to create a powerful quantum computer comes closer to reality with the help of an elementary particle.


Cobalt/Carbanak bank malware gang’s alleged leader arrested

These ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Second company claims it can unlock iPhone X

A tiny US company called Grayshift is reportedly quietly touting software it claims can unlock Apple’s flagship handsets, the iPhone X and 8.


How women are helping to fight ...

Continue Reading →
0

Fifty Years of Computing – Doug Engelbart

Fifty years ago, in 1968, computers were big mainframe systems that were programmed using large decks of punch cards.  All output came out of a printer.  There were no computer displays yet, just rows of blinking light bulbs that were call a “monitor.”  All programs were run as batch jobs, one at a time.  There were no windows, no multi-tasking, no interactive computing as we know it today.

On December 8, 1968 a computer engineer named Doug Engelbart made a presentation ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


20 Worst Passwords of 2017

Nearly identical to last year’s list.  Some people never learn.  If you are using any of these passwords, please change them now!


Announcing the Free Cyber Security for Beginners Course

Build your online security skills for free with this practical course from Heimdal Security.


Microsoft Word slams the ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


 Over 75% of Android apps are secretly tracking users

Yale Privacy Lab has discovered hidden trackers in hundreds of popular Android apps that send app manufacturers your location, activity, and other personal info.


Cayla doll too eavesdroppy to put under the Christmas tree, says France

That Bluetooth Cayla doll and i-Que surveillance robot can be taken ...

Continue Reading →
0
Page 1 of 4 1234