Google Enhances Spam Filtering

spamThere are really two stories here.  The first is about how your Gmail account should become smarter about what you consider to be SPAM, as well as what you consider to be desirable email.  We are talking about a system actually learning your personal individual preferences over time.  For instance, I get a lot of email newsletters and marketing emails in my Inbox, ...

Continue Reading →
0

Baby You Can Hack My Car

This spring I bought a new Kia Forte that came with a whole lot of electronic goodies including Bluetooth synchronization, voice command, and driver programmable features galore.  And evidently, the potential to be hacked.

This is old news now, but security researchers were able to hack a Jeep Cherokee through the on-board Internet connectivity feature called “UConnect.”

“They were able to change the temperature of the air conditioning, turn on the windshield wipers and blast the wiper fluid to blur the ...

Continue Reading →
0

No Secrets, No Privacy, No Security

cybersecurity_436x270Last week we talked about the impossibility of keeping secrets over the long term, the liberation of secret information by groups or individuals who just wanted the secrets exposed.  A close cousin, conceptually, is privacy.  At this point, there is no privacy anymore, not really.

Time was when your life was largely unknown, and privacy was an easy thing to have. But this is ...

Continue Reading →
0

No More Secrets

Hacker movies are one of my favorite genres, and have been for a long time.  Go figure.  One of my favorites from the “olden days” is the 1992 movie “Sneakers.”  In this movie Robert Redford and his merry band of cybersecurity testers are tasked with the recovery of a mysterious “black box” which basically can solve for any type of encryption that was in use at that time.  At one point in the movie the blind hacker discovers ...

Continue Reading →
0

EMV Cards Due October – It’s About Time!

EMVcardEMV or “chip and PIN” cards have a much higher level of security built right into the card, and have been in common use in Europe for over a decade.  For some reason (too expensive to implement?  Really?) the United States has continued to use the horribly insecure magnetic stripe credit card, which is why exploits like the Target Christmas card breach are even possible.

On October 1st, the United States will FINALLY join ...

Continue Reading →
0

Tor Story 2

This is the second of a three-part series of articles about TOR.  On Monday we took a look at the surprising origins of the TOR network.  Today we will be taking a look at how TOR works.

HOW TOR WORKS

To use TOR, a person just needs to go to The TOR Project , and download an install the TOR web browser. Then it makes sense to read the TOR warning document. The rules include:

  • Use the TOR browser
  • Don’t torrent ...
Continue Reading →
0

Tor Story 1

TORlogoTOR or The Onion Router is one of the greatest anonymizer services available on the Internet, and allows anyone to use the Internet without revealing their source IP address, and through that, their location. Yet as recently as last November, when the FBI took down the Silk Road server and arrested its operator , and Interpol followed up with the seizure of 400 Dark Web marketplace sites and the arrest of ...

Continue Reading →
0

WordPress Site Owners – Update Now

WordPresslogoJust a quick note to my WordPress pals – the latest update, WordPress 4.2.3, has an import fix for a cross site scripting (XSS) vulnerability that leaves your site vulnerable to attack.  According to Sophos:

“The flaw allows WordPress users who have Contributor or Author roles to add javascript to a site (something normally reserved for Editors and Administrators) using specially crafted shortcodes.

Attackers ...

Continue Reading →
0
Page 50 of 55 «...2030404849505152...»