
A team of engineers at the University of California San Diego has demonstrated for the first time that the Bluetooth signals emitted constantly by our mobile phones have a unique fingerprint that can be used to track individuals’ movements.
Although I’m disappointed that JPMorgan Chase delayed the disclosure of the breach that touched more than 83 million U.S. households (they knew about it at least four months ago), I’m even more upset at what they disclosed – that key customer financial data was not stolen. JPMorgan may tout the expertise of their security team…
If you are suspicious of Tor, tired of the laggy connection, or simply want a more stable means to ensure your connection is encrypted and secure, you can easily create a VPN connection through a VPN connection which ensures anonymity and hard-core encryption of your network stream (with kill switches to protect your identity if…
The OpenSSL encryption flaw, known as the Heartbleed bug, is being called one of the biggest security flaws ever seen on the Internet. One security analyst called it “catastrophic” and said that on a scale of 1 to 10, the vulnerability was an 11. The newly discovered vulnerability isn’t “big news” because of its complexity,…
According to sources, the Department of Homeland Security was advised last week, to create a “cyber skills task force” that would act as a reserve army of cyber specialists in order to mold top-notch cybersecurity talent to address U.S. cybersecurity emergencies. Called the “CyberReserve” and similar to the National Guard program, CyberReserve would ensure professional…
Researchers at the University of California San Diego have monitored a botnet that they believe scanned the entire IPv4 address space, possibly in less than two weeks. Using a network block called the UCSD Network Telescope, also known as the UCSD darknet, researchers noticed the illicit activity in February 2011.
The folks at RSA have proposed a new method of securing user passwords obtained from database hacks – break the password into separate pieces and store them at separate locations. If the database were compromised and the password stolen, all the hacker would have would be half of the password hash which would make it…
Techspot is reporting that Blizzard secretly embeds World of Warcraft player information into screenshot graphics in an effort to track down illegal private servers. A Slashdot member notice strange artifacts in WOW screen shots that he was taking. According to Techunknowns, after a few days, a group from OwnedCore was able to decrypt the information…