Categories » News

As Data Overflows Online, Researchers Grapple With Ethics – 12 August 2014

12 August 2014 by Vindu Goel – “The New York Times” As Data Overflows Online, Researchers Grapple With Ethics. Scholars are grappling with the ethical implications of using big data collected by corporations in order to conduct social science research. … Continue reading

Fugitive Juggler Caught by Facial-Recognition Technology – 13 August 2014

13 August 2014 – “BBC Technology” Fugitive Juggler Caught by Facial-Recognition Technology. US citizen Neil Stammer who jumped bail fourteen years ago on child sexual abuse charges has been arrested in Nepal after the use of facial recognition technology. He … Continue reading

Michael J Fox Foundation Tests Sensors to Track Parkinson’s – 13 August 2014

13 August 2014 – “BBC Technology” Michael J Fox Foundation Tests Sensors to Track Parkinson’s. The Michael J Fox Foundation has teamed up with Intel to equip patients with smart watches. The watches allow more than 300 data points on … Continue reading

New Site Recovers Files Locked by Cryptolocker Ransomware- 6 August 2014

6 August 2014- By Brian Krebs- KrebsOnSecurity.com New Site Recovers Files Locked by Cryptolocker Ransomware. FireEye and Fox-It have collaborated to help out the hundreds of thousands of users worldwide who fell victim to the Cryptolocker ransomware.  Users simply need … Continue reading

Russian Hackers Amass Over a Billion Internet Passwords- 5 August 2014

5 August 2014- by Nicole Perlroth and David Gelles- New York Times Russian Hackers Amass Over a Billion Internet Passwords. A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion user name and password … Continue reading

New Malware Operates Entirely from the Registry Using No Files- 31 July 2014

31 July 2014- by Paul Rascagnères- GDATA SecurityBlog Poweliks: the persistent malware without a file. Malware has been discovered which operates exclusively from the victim machine’s registry, posing problems for some of the dominant remediation paradigms. The malware also uses a … Continue reading

The Social Laboratory: Singapore’s Experience with Surveillance and Big Data- 29 July 2014

29 July 2014- by Shane Harris- Foreign Policy The Social Laboratory. Singapore is testing whether mass surveillance and big data can not only protect national security, but actually engineer a more harmonious society. This essay explores Singapore’s mass surveillance and data-mining apparatus, … Continue reading

Drones Outpacing Rules as Popularity Soars in New York – 3 August 2014

3 August 2014 by James Barron – “The New York Times” Drones Outpacing Rules as Popularity Soars in New York. New York City is experiencing a dramatic increase in drones in its airspace controlled by tech enthusiasts. This increase is … Continue reading

How Hackers Could Slam on Your Car’s Brakes – 1 August 2014

1 August 2014 by Erica Fink – “CNN Money” How Hackers Could Slam on Your Car’s Brakes. Researchers have released a list of the most hackable vehicles among 20 different models compared. The study looked at the technical configurations of the cars to … Continue reading

Wearable Users Tracked with Raspberry Pi – 1 Aug 2014

1 August 2014 – “BBC News” Wearable users tracked with Raspberry Pi. Those who use wearable technology to track their health can be traced with a raspberry pi, a device that costs roughly $70, security group Symantec discovers.

Armenia: Citizens Urged to Write Wikipedia Entry Each – 31 July

31 July 2014 – “BBC News from Elsewhere” Armenia: Citizens Urged to Write Wikipedia Entry Each. Armenians are being encouraged to each write a Wikipedia entry in order to bolster the quality and quantity of articles in the Armenian language and … Continue reading

Russia Offers $110,000 to Crack Tor Anonymous Network- 28 July 2014

28 July 2014 – “BBC” Russia Offers $110,000 to Crack Tor Anonymous Network. Russia is offering 3.9m roubles, or $110,000, to anyone who can identify users of the Tor network in order to “ensure the country’s defense and security.” The contest … Continue reading

StubHub Wasn’t Hacked. But Its Users Were.- 24 July 2014

24 July 2014 by Andrea Peterson – “The Washington Post” StubHub Wasn’t Hacked. But Its Users Were. Recent reports of ticket resale Internet company StubHub being hacked are misleading. Though their user’s data was compromised, this was not another case of … Continue reading

Meet ‘Project Zero,’ Google’s Secret Team of Bug-Hunting Hackers- 15 July 2014

15 July 2014- by Andy Greenberg- “Wired” Meet ‘Project Zero,’ Google’s Secret Team of Bug-Hunting Hackers. Google has put together a team of renowned vulnerability researchers who will work to find and secure vulnerabilities in software and protocols not made or … Continue reading

Israel’s Channel 10 TV Station Hacked by Hamas- 16 July 2014

16 July 2014- by “Waqas”- “HackRead” Israel’s Channel 10 TV Station Hacked by Hamas. Hamas has attacked the satellite uplink used by Israeli channel 10, in a broadcast signal intrusion incident. This is the second such attack, the first being … Continue reading

Crowdstrike Attributes Hacking Attacks to PLA Unit 61486- 9 June 2014

9  June 2014- by Nathaniel Hartley- “Crowdstrike Blog” Hat-tribution to PLA Unit 61486. Crowdstrike has attributed a number of hacking attacks on the US and European defense, aerospace and satellite industries to a Chinese military unit. Among the evidence presented … Continue reading

Microsoft Research Paper on Individual Password Management- 1 July 2014

1 July 2014- by Dinei Florencio, Cormac Herley, and Paul C. van Oorschot- “Microsoft Research” Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. Microsoft researchers have published a paper, to be presented at the USENIX Security 2014 conference … Continue reading

How Russian Hackers Stole the Nasdaq- 17 July 2014

17 July 2014- by Michael Riley- “Bloomberg Businessweek” How Russian Hackers Stole the Nasdaq. A review of an incident, still not wholly resolved within the public domain, wherein hackers of possible Russian origin gained access to the operating code for … Continue reading

Apple hits back at China over iPhone privacy claims- 14 July 2014

14 July 2014- by Kevin Rawlinson- “BBC News” Apple hits back at China over iPhone privacy claims. Apple has responded to claims by researchers in China that the IPhone IOS 7 threatens Chinese national security through the “Frequent Locations” feature, … Continue reading

Chinese Hackers Pursue Key Data on U.S. Government Workers- 9 July 2014

9 July 2014- By Michael S. Schmidt, David E. Sanger, and Nicole Perlroth- “The New York Times” Chinese Hackers Pursue Key Data on U.S. Government Workers. The Office of Personnel Management has apparently had its servers and databases breached by … Continue reading