Amid the mounting crisis from the Facebook/Cambridge scandal, sources say Facebook's security chief is planning to leave the company after disagreements about how to handle the spread of disinformation investigations and disclosures.
Ms. Smith |
21 Mar |
Read more
An unencrypted USB flash drive detailing airport security and anti-terror measures was found on a street and sparked an investigation by Heathrow Airport.
Ms. Smith |
06 Nov |
Read more
Google researchers found seven severe security flaws in the open-source DNS software package Dnsmasq. The flaws put a huge number of devices at risk of being hacked.
Ms. Smith |
04 Oct |
Read more
In a new type of DDoS attack, skilled bad actors use pulse wave DDoS assaults to exploit weaknesses in appliance-first hybrid mitigation solutions and pin down multiple targets.
Ms. Smith |
17 Aug |
Read more
Trump Hotels admitted that hackers stole credit card and other sensitive data about guests who stayed at 14 Trump properties; the third-party reservation booking system was breached.
Ms. Smith |
19 Jul |
Read more
Tesla is working to make sure a fleet-wide attack can't occur, Musk told attendees at the National Governors Association
Ms. Smith |
19 Jul |
Read more
While there is a general consensus that the Knightscope security robot in Washington, D.C., committed suicide on Monday, the same everyone-agrees-opinion is not true for the $7.4 million heist of the cryptocurrency Ether that happened on the same day.
Ms. Smith |
19 Jul |
Read more
Even weak attackers can pull off a password reset man-in-the-middle attack by getting you to register at a new website.
Ms. Smith |
07 Jul |
Read more
GitHub has been hammered by a continuous DDoS attack for three days. It's the "largest DDoS attack in github.com's history." The attack is aimed at anti-censorship GreatFire and CN-NYTimes projects, but affected all of GitHub; the traffic is coming from China as attackers are reportedly using China's search engine Baidu for the purpose of "HTTP hijacking."
Ms. Smith |
30 Mar |
Read more
When you signed up with your ISP, or with a wireless carrier for mobile devices, if you gave it any thought at all when you signed your name on the contract, you likely didn't expect your activities to be a secret, or to be anonymous, but how about at least some degree of private? Is that reasonable? No, as the law currently suggests that as a subscriber, you "volunteer" your personal information to be shared with third-parties. Perhaps not the content of your communications, but the transactional information that tells things like times, places, phone numbers, or addresses; transactional data that paints a very clear picture of your life and for which no warrant is required.
Ms. Smith |
31 Jul |
Read more
Although NSA officials were not sure about what all documents Edward Snowden took with him, they've changed their tune a few times after some new leak proves their previous proclamations to be false...like when former NSA Chief Keith Alexander admitted to lying about phone surveillance stopping 54 terror plots. Despite a year of NSA officials claiming that Edward Snowden had access to reports about NSA surveillance, but no access to actual surveillance intercepts, that ends up being lie too.
Ms. Smith |
07 Jul |
Read more
Microsoft brought the hammer down on No-IP and seized 22 of their domains. They also filed a civil case against "Mohamed Benabdellah and Naser Al Mutairi, and a U.S. company, Vitalwerks Internet Solutions, LLC (doing business as No-IP.com), for their roles in creating, controlling, and assisting in infecting millions of computers with malicious software--harming Microsoft, its customers and the public at large."
Ms. Smith |
02 Jul |
Read more
We previously looked at the huge demand for ProtonMail, an easy-to-use and free NSA-proof email service created by CERN and MIT scientists. It is based in Switzerland, meaning the U.S. government can't just hoover it up without an enforceable Swiss court order, which is hard to come by since the Swiss legal system has "strong privacy protections." The demand for the end-to-end encrypted email service was so high that ProtonMail ran out of a month's worth of server capacity in three days.
Ms. Smith |
02 Jul |
Read more
Bright minds from Harvard University and Boston University collaborated on a new research paper that looks at how the government can exploit legal loopholes as well as "technical realities of Internet communications" to get around Americans' Fourth Amendment rights and hoover up their electronic communications.
Ms. Smith |
01 Jul |
Read more
If you are exposed to negative person, then that negativity might bleed over to infect you. If you are exposed to a positive person, then those positive emotions might put you in a more positive frame of mind as well. Since you likely have experienced that in real life, then you probably don't need research to back that up. Facebook's data scientists were out to prove if emotions expressed digitally would also be contagious.
Ms. Smith |
30 Jun |
Read more