Tags » Information Security

Security researcher suggests 600M iOS devices have Apple-created backdoors for data

How secure is the data your iPhone or iPad? A little less than perhaps you thought, according to Jonathan Zdziarski, who has a slideshow of findings that may surprise you.

42 more words
Information Security

Students hack Tesla Model S, make all its doors pop open IN MOTION

Zhejiang University students have hacked the Tesla Model S with an attack that enabled them to open its doors and sun roof, switch on the headlights and sound the horn – all while the car was driving along.

69 more words
Digital Information Law

Beware Keyloggers at Hotel Business Centers

The U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers, warning that crooks have been compromising hotel business center PCs with keystroke-logging malware in a bid to steal personal and financial data from guests.

10 more words
Cyber Fraud

Meet CISA – Dianne Feinstein’s Latest Attack On Privacy, Civil Liberties And The Internet

Submitted by Mike Krieger of Liberty Blitzkrieg blog,

here’s not much good you can count on Congress to accomplish, but when it comes to introducing and passing oligarch protecting, civil liberties destroying legislation, our “representatives” are absolutely relentless in their determination. 1,745 more words

ZeroHedge

Sally's Special Services reblogged this on Sally's Special Services and commented:

CISA STOP CISA! CISA IS AN ATTACK ON OUR FREEDOM OF SPEECH AND FREE ENTERPRISE! THEY WANT TO SHUT US INDEPENDENT THINKERS UP! THEY DO NOT WANT US TO HAVE ALTERNATIVE MEDIA TO THE BIASED MSM THAT PRINTS WHAT THE CORRUPT COMMUNIST/DEMON-RATS TELL THEM TOO!! WE MUST STOP THIS GOVERNMENT INTRUSION INTO OUR PERSONAL LIFE'S AND CIVIL LIBERTIES!

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones

The new components target Android, iOS, Windows Mobile, and BlackBerry users and are part of Hacking Team’s larger suite of tools used for targeting desktop computers and laptops.

184 more words
Information Security

Virus-infected Office Macro threats and self-signed SSL certificates

I saw an article today whose headline (“Remember macro viruses? Infected Word and Excel files? They’re back…”) drew my eye. It also got coverage on… 500 more words

Excel