Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Pac-Man Turns 40

The classic arcade game—which turns 40 on May 22—made history by launching an unprecedented merchandise empire. But Pac-Man was innovative in other ways, too. During a time when video games’ default audience was adult men, Pac-Man successfully engaged women and children, becoming one of the first games to broaden the medium’s appeal in both ...

Continue Reading →
0

“Sandworm” Is The True Story About Russian Cyberwarfare

Last month I read the book Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers, by Andy Greenberg, senior writer for Wired magazine.  If you want to understand how cyber-war has changed the face of military operations in the 21st century, this book explains everything.  This book has put the threat of ...

Continue Reading →
0

With “Friends” Like The Saudis, Who Needs Enemies?

Or The Strange Case of Jeff Bezos’ IPhone and the Saudi Crown Prince

The evidence says that the Saudi Arabian Crown Prince, Mohammed bin Salman (aka MBS) engineered a way to hack Jeff Bezos’ cell phone.  Just why MBS would be interested in Jeff, Jeff’s phone, or Jeff’s life is an interesting question, with surprising answers.

It seems that MBS invited Jeff Bezos to a private party, and during the course of the ...

Continue Reading →
0

Staying Private Online Using Popular Browsers

Is there a way to maintain privacy online, and defeat tracking without resorting to extreme measures?  We have written articles recently about the most private browsers, but using them requires changing habits and abandoning web browsers that you are already familiar with.

I came across this graphic on Pinterest, and thought it was worth sharing.  It shows some pretty ...

Continue Reading →
0

Tomorrow Is Data Privacy Day

Keeping your information private is nearly impossible these days.  The Internet has turned us all into virtual blabbermouths oversharing everything.  And what we aren’t already sharing with wild abandon is being harvested, parsed, analyzed, stored in endless databases, and sold by big Internet companies.  Then that information is stolen by cyber-criminals and sold on the Dark Web.

The task of keeping our information private seems impossible, but there still are actions you ...

Continue Reading →
0

The Increasing Use of Mobile Spyware Apps

Never in human history has there been a platform for tracking, eavesdropping, reconnaissance, and surveillance like the smartphone.  With the right malware or phone store app, a marketing company, suspicious spouse, parent, nation-state cyber-spy, or your own government or law enforcement agency can easily spy on anyone carrying a smartphone.  Mobile devices often provide a bridge between a target’s personal life and professional ...

Continue Reading →
0

Hack Turns iPhones and Android phones into Ultimate Surveillance Tool

If you visited certain websites with your iPhone (or Android or Windows device**) over the last two years, it is possible that your iPhone downloaded and installed malware that allowed attackers to intercept and record everything you did and everywhere you went with your iPhone.  This includes real-time location information, all your emails and messaging (including encrypted versions such ...

Continue Reading →
0

Beating Surveillance Cameras

That fifteen minutes of fame that Andy Warhol promised us is getting much longer.  These days we have all become stars of the tiny screen.  The screens I am talking about are the monitors for all the CCTV and surveillance video cameras that are just about everywhere.  Wouldn’t it be great if there was a way to make yourself invisible to ...

Continue Reading →
0

Surveillance by Law Enforcement Reaches New Heights

Law enforcement agencies never stop complaining about how hard their jobs are. The crooks are using technology in criminal activities, and hiding themselves on the Internet using anonymizing proxies such as TOR, and VPNs.   And how it would be so much easier if they just could have a convenient “backdoor” to break encrypted messages.  The truth of the matter is that ...

Continue Reading →
0
Page 1 of 8 12345...»