Cyber Security

Posts about Cyber Security. Subscribe to my newsletter to make sure you don't miss anything.
Snapchat
Snapchat said on Thursday it would alter its app to make it harder for malicious users to collect and leak millions of usernames connected to phone numbers. The move comes after a group calling itself SnapchatDB rang in the New Year by leaking 4.6 million partially redacted phone numbers, in a stunt they said was Continue Reading →
Snapchat
Last week security researchers published a way to skim Snapchat’s full database, and it appears someone did it before the vulnerability — which, according to those researchers had been known for months — was addressed. A website called SnapchatDB! has appeared posting SQL/CSV files that it claims contain the username and associated phone number for Continue Reading →
NSA
The US National Security Agency can reportedly sniff out every last bit of data from your iPhone, according to leaked NSA documents published by German magazine Der Spiegel. Known as DROPOUTJEEP, the spyware is said to be one of the tools employed by the NSA’s ANT (Advanced or Access Network Technology) division to gain backdoor Continue Reading →
Family Photo Album
What if your home caught on fire? Assuming that you, your family and your beloved pets were able to get out safely, what would you grieve for the most? A fire can destroy every possession in your home, leaving little to nothing of any salvageable value. Even if you have a good homeowner’s insurance policy, Continue Reading →
NSA
Attendees at the Chaos Communications Congress in Hamburg this weekend got a surprising rundown of the NSA’s surveillance capabilities, courtesy of security researcher Jacob Appelbaum. Appelbaum, who co-wrote the Der Spiegel article that first revealed the NSA catalog, went into further detail onstage, describing several individual devices in the catalog and their intended purposes. Alongside Continue Reading →
NSA
The insert method and other variants of QUANTUM are closely linked to a shadow network operated by the NSA alongside the Internet, with its own, well-hidden infrastructure comprised of “covert” routers and servers. It appears the NSA also incorporates routers and servers from non-NSA networks into its covert network by infecting these networks with “implants” Continue Reading →
SD Card
The hardware hacker Bunnie Huang gave a talk at the Chaos Compute Club Congress where he offered some good news and some bad news. The good news? SD cards contain powerful, handy micro controllers that are useful to hackers and hobbyists. The bad news? SD cards are woefully insecure. In a detailed and readable post, Continue Reading →
Snapchat
Snapchat now has to deal with yet another potentially large security vulnerability as Gibson Security released a new report reiterating that it is possible for hackers to obtain Snapchat users’ phone numbers. They initially revealed this hack four months ago and it went ignored by Snapchat. Now, after multiple app updates, Gibson Security says the Continue Reading →

Get Briefed Every Day!

Subscribe to my daily newsletter featuring current events and the top stories in AI, technology, media, and marketing.

Subscribe