Upgrading to iOS 6? Be careful about leaving your locked iPhone unattended unless you change some settings. Otherwise an unscrupulous stranger could order Siri to send tweets and Facebook posts from your account that you didn’t make — even if your phone is locked. Apple has added the ability for Siri to interact with Twitter Continue Reading →
Cyber Security
Posts about Cyber Security.
Subscribe to my newsletter to make sure you don't miss anything.
Microsoft today released so-called “Fix It” software that will protect Windows users from a critical Internet Explorer hole being exploited in attacks until the company releases a cumulative update for IE on Friday. The Fix It tool “is an easy, one-click solution that will help protect your computer right away. It will not affect your Continue Reading →
Hackers at the Mobile Pwn2Own hacking competition in Amsterdam this week have uncovered a security flaw that allows attackers to swipe iPhone users’ pictures, address books and browser histories from their phones. TechWorld reports that the hackers created a Webkit browser exploit that circumvents Safari’s security protocols if a user happens to be on a Continue Reading →
We were worried there, for a minute. After code explorers found that Amazon’s Kindle Fire HD 7-inch had both a locked bootloader and extra security measures, there was a brief concern that the pseudo-Android tablet might be very tough to hack. As it turns out, there was no reason to lose faith. Hashcode, Justin Case, Continue Reading →
This is probably not what RIM executives wanted to read with their coffee this morning, but TechRepublic reports that both analysts and CIOs say that Apple’s iPhone has now matched RIM’s BlackBerry devices when it comes to enterprise security. As evidence, TechRepublic cites the latest research from Trend Micro showing the iPhone just behind BlackBerry Continue Reading →
Web hosting giant GoDaddy has completed its investigation of the outage on Monday that crippled its site as well as hundreds of thousands that it hosts, and the company has concluded it was not the result of an external attack. This after a member of the hacktivist group Anonymous claimed responsibility on Twitter yesterday, saying Continue Reading →
A member of the Anonymous hacktivist group appears to have taken down GoDaddy with a massive Distributed Denial of Service (DDoS). The widespread issue seems to be affecting countless websites and services around the world, although not for everyone. Godaddy.com is down, but so are some of the site’s DNS servers, which means GoDaddy hosted Continue Reading →
A digital publishing company named BlueToad has come forward to take responsibility for the leak of a million iOS unique device identifiers (UDIDs) that were previously attributed to an alleged FBI laptop hack. In a number of interviews published Monday, BlueToad apologized to the public for the incident, explaining that hackers had broken into the Continue Reading →
The American internet security firm McAfee said that the Harry Potter actress is the ‘most dangerous’ celebrity to search for online. Many sites use Watson to trick users into downloading malicious software or to steal personal information. When searching for the 22 year-old Watson there is a one-in-eight chance of landing on a malicious site. Cyber Continue Reading →
The computer revolution arrived late at the FBI, which was still collecting and matching fingerprints in 1999 in much the same way that it did when the agency first began collecting the images in 1924. But that’s been changing lately and privacy hawks are watching closely. As the millennium neared, the agency finally traded in Continue Reading →