Skip to main content

Home/ ITGSonline/ Group items tagged Security

Rss Feed Group items tagged

dr tech

Opinion | The Worm That Nearly Ate the Internet - The New York Times - 0 views

  •  
    "While some experts still disagree, most now believe that Conficker was the work of Ukrainian cybercriminals building a platform for global theft who succeeded beyond all expectation, or desire. The last thing a thief wants is to draw attention to himself. Conficker's unprecedented growth drew the alarmed attention of cybersecurity experts worldwide. It became, simply, too hot to use."
dr tech

Quest Diagnostics Says Up to 12 Million Patients May Have Had Financial, Medical, Perso... - 0 views

  •  
    "Quest Diagnostics, one of the biggest blood testing providers in the country, warned Monday that nearly 12 million of its customers may have had personal, financial and medical information breached due to an issue with one of its vendors."
dr tech

UK cops are secretly harvesting all data from the phones and cloud accounts of suspects... - 0 views

  •  
    "Many services retain the data they harvest indefinitely, and some have been caught storing (and losing) the data without encryption: for example, in 2017 the Greater Manchester Police were found to have lost data from victims of violent and sexual crimes, which had been stored unencrypted on DVDs and sent through the post."
dr tech

The Glass Room - 0 views

  •  
    "And if your password can be reverse-engineered to reveal something about you or others like you, how safe or unique is it really."
dr tech

Hacker Finds He Can Remotely Kill Car Engines After Breaking Into GPS Tracking Apps - M... - 1 views

  •  
    "By reverse engineering ProTrack and iTrack's Android apps, L&M said he realized that all customers are given a default password of 123456 when they sign up. At that point, the hacker said he brute-forced "millions of usernames" via the apps' API. Then, he said he wrote a script to attempt to login using those usernames and the default password. "
dr tech

Vulnerabilities in GPS fleet-tracking tools let attackers track and immobilize cars en ... - 0 views

  •  
    "L&M used a credential stuffing attack: using email addresses gleaned from massive breaches to gain access by repeatedly trying different email/password combinations."
dr tech

The future of cybersecurity: Your body as a hacker-proof network | ZDNet - 0 views

  •  
    "The Purdue researchers have created Electro-Quasistatic Human Body Communication (EQS-HBC) which uses low-frequency, carrier-less broadband transmission, and so keeps the signal almost entirely within the human body. That means data from pacemakers and other implantable medical devices would only be readable a handful of centimetres outside the wearer."
dr tech

Researchers find mountains of sensitive data on totalled Teslas in junkyards / Boing Boing - 0 views

  •  
    "Teslas are incredibly data-hungry, storing massive troves of data about their owners, including videos of crashes, location history, contacts and calendar entries from paired phones, photos of the driver and passengers taken with interior cameras, and other data; this data is stored without encryption, and it is not always clear when Teslas are gathering data, and the only way to comprehensively switch off data-gathering also de-activates over-the-air software updates for the cars, "
dr tech

The Downfall of Computers - David Koff - Medium - 0 views

  •  
    "These exploits are based on chip engineering flaws, not on software flaws. Apple, Google, Abode, Microsoft, and other software companies didn't write poor software or bad Operating Systems to cause these problems to occur. Rather, the chip manufacturers - Intel, AMD and ARM - designed and then engineered computer chips with flaws built into them. Once discovered, those flaws allow the Meltdown and Spectre exploits to be run. Worse, these chips have been sold with consumer computers, servers and mobile devices since 1995. so the impact is, potentially, both personal and global in scope."
dr tech

DARPA Is Building a $10 Million, Open Source, Secure Voting System - Motherboard - 0 views

  •  
    "Now they might finally get this thanks to a new $10 million contract the Defense Department's Defense Advanced Research Projects Agency (DARPA) has launched to design and build a secure voting system that it hopes will be impervious to hacking."
dr tech

A critical flaw in Switzerland's e-voting system is a microcosm of everything wrong wit... - 0 views

  •  
    ""We have only examined a tiny fraction of this code base and found a critical, election-stealing issue," said Lewis, who is currently executive director of the Open Privacy Research Society, a Canadian nonprofit that develops secure and privacy-enhancing software for marginalized communities. "Even if this [backdoor] is closed its mere existence raises serious questions about the integrity of the rest of the code.""
dr tech

Police across the US are training crime-predicting AIs on falsified data - MIT Technolo... - 0 views

  •  
    "The system used historical data, including arrest records and electronic police reports, to forecast crime and help shape public safety strategies, according to company and city government materials. At no point did those materials suggest any effort to clean or amend the data to address the violations revealed by the DOJ. In all likelihood, the corrupted data was fed directly into the system, reinforcing the department's discriminatory practices."
dr tech

The Morris Worm Was the World's First Cyberattack - 0 views

  •  
    "His program became the first of a particular type of cyber attack called "distributed denial of service," in which large numbers of internet-connected devices, including computers, webcams and other smart gadgets, are told to send lots of traffic to one particular address, overloading it with so much activity that either the system shuts down or its network connections are completely blocked."
dr tech

Major vulnerability in 5G means that anyone with $500 worth of gear can spy on a wide a... - 0 views

  •  
    "That's why it was so important that the new 5G mobile protocol be designed to foil IMSI catchers, and why the 3rd Generation Partnership Project, or 3GPP (the body standardizing 5G) updated the Authentication and Key Agreement (AKA) to resist IMSI catching techniques."
dr tech

Largest dump in history: 2.7 billion records; 773 million of them unique; 140 million n... - 0 views

  •  
    "A dump called "Collection #1" has been released by parties unknown, containing email addresses and cracked passwords: in its raw form, it contains 2.7 billion records, which Troy "Have I Been Pwned" Hunt (previously) de-duplicated to come up with 773 million unique records -- of those 140,000,000 email addresses and 10,000,000 passwords have never been seen in the HaveIBeenPwned database before."
dr tech

Together we can thwart the big-tech data grab. Here's how | John Harris | Opinion | The... - 0 views

  •  
    "Blockchain technology has also opened the way to new models whereby endless micropayments can be made in return for particular online services or content; and, if people voluntarily allow elements of their data to be used, rewards can flow the other way. Here perhaps lies the key to a system beyond the current, Google-led model, in which services appear to be free but the letting-go of personal data is the actual price."
dr tech

Open Rights Group Scotland - E-voting's Unsolvable Problem - 0 views

  •  
    Ahhh ITGS group - a great discussion on the evoting problem would have been perfect for your Paper 2. "Remember: all of these principles of security, anonymity and verifiability have to be achieved in an understandable way. If they can't be then you get the opportunity for losers to claim fraud, and their supporters to believe them."
dr tech

Phishers steal San Diego school data going back to 2008 / Boing Boing - 0 views

  •  
    "After a successful phishing attack that captured over 50 accounts, hackers stole 500,000 records from the San Diego Unified School District, for staff, current students, and past students going all the way back to 2008; including SSNs, home addresses and phone numbers, disciplinary files, health information, emergency contact details, health benefits and payroll info, pay information, financial data for direct deposits."
1 - 20 of 500 Next › Last »
Showing 20 items per page