Category: Security

  • December 12: Break the Internet, Save Net Neutrality

    The FCC is days away from voting to end net neutrality. Congress can still stop the vote, but only if we make them. On December 12th — protest by“breaking” your site, app, or social media profile. Use our tools, or do something creative and wild. Show your audience how terrible the future of the web could be,…

  • #BlackFriday Announcement from Privacy Lab

    Privacy Lab has published details from its research[1] into 25 trackers hidden inside popular Google Play apps such as Uber, Tinder, Skype, Twitter, Spotify, and Snapchat. Publication of this information is in the public interest, as it reveals clandestine surveillance software that is unknown to Android users at the time of app installation. These trackers vary…

  • 10 tips for safe online shopping on Cyber Monday

    Shoppers familiar with the Cyber Monday circus know they’re stepping into the lion’s den. The Internet has always been a lawless place, but it becomes particularly rough during the holiday shopping season. In preparation for the frenzy, cyber villains have crafted a virtual onslaught of social engineering scams, malspam, and malicious, spoofed websites in order…

  • You’re Browsing a Website. These Companies May Be Recording Your Every Move.

    Your every move on the internet is being sold to third parties… Behind many consumer websites, software companies track users’ moves, potentially exposing personal information such as medical conditions or prescription-drug use. …. “I don’t think most users realize that when they interact with a website that their information about that visit is being shared…

  • MS Office Built-in Feature Allows Malware Execution Without Macros Enabled

    This exploit uses the users’ common sense against themselves. Security researchers at Cisco’s Talos threat research group have discovered one such attack campaign spreading malware-equipped Microsoft Word documents that perform code execution on the targeted device without requiring Macros enabled or memory corruption. This Macro-less code execution in MSWord technique, described in detail on Monday by a…

  • Apple Allows Uber to Use a Powerful Feature that Lets it Record iPhone Screen

    What could possibly go wrong when your privacy and phone are given “selectively” without your knowledge or ability to intervene?  What happens when Uber is hijacked?  Or Uber uses this access unscrupulously? Security researcher Will Strafach recently revealed that Apple selectively grants (what’s known as an “entitlement“) Uber a powerful ability to use the newly…

  • Hackers pounce on 3 vulnerable WordPress plugins – Naked Security

    Remember the old saying about bad things coming in threes? Flaw hunters Wordfence would probably agree with the sentiment after uncovering some nasty zero-day flaws in a trio of WordPress plugins. Not a great start, then, but much worse is that the vulnerabilities were already being exploited when the company discovered them by chance during recent…

  • It’s 3 Billion! Yes, Every Single Yahoo Account Was Hacked In 2013 Data Breach

    Anyone still using Yahoo is either really uninformed or masochistic (or maybe employed by Equifax?)… The largest known hack of user data in the history just got tripled in size. Yahoo, the internet company that’s acquired by Verizon this year, now believes the total number of accounts compromised in the August 2013 data breach, which was disclosed…

  • Over 711 Million Email Addresses Exposed From SpamBot Server

    Don’t despair, here is a link to a site that will tell you whether your email account has been breached.  https://haveibeenpwned.com/  I am very careful and I was breached in 4 areas: Adobe breach 2012 (changed in 2014); LinkedIn in 2013 (changed in 2013); and 2 other sites that sold the 2 old breaches.  If…

  • Warning: Two Dangerous Ransomware Are Back – Protect Your Computers

    They’re baaaack, bigger and stronger. Learn how to protect yourself from the latest iterations of ransomware… Currently, there is no decryptor available to decrypt data locked by Mamba and Locky as well, so users are strongly advised to follow prevention measures in order to protect themselves. Beware of Phishing emails: Always be suspicious of uninvited documents…