Tag Cloud
-
Recent Posts
- CV19 SelfDefense Mobile Phone App now available for download
- Women are pretending to be men on Instagram to circumvent algorithmic blocking
- Breaking New Ground in Human-Computer Interactions Research
- Hackers New Tactic: Locking All the Doors at an Expensive Hotel
- DARPA’s Master Plan to Spot Facebook Terrorists?
Archives
Monthly Archives: January 2011
Democrats Introduce Legislation For National Security Against Cyber Attacks
Cyber criminals and state adversaries pose a threat to both national security and our economy by threatening infrastructure, defense systems and global communications. Criminals and hackers probe U.S. government computer networks millions of times every day, about 9 million Americans … Continue reading
Man tries to work for CIA in order to spy for China
Glenn Duffie Shriver from Michigan was sentenced to 48 months in prison for conspiring to provide national defense information to intelligence officers of the People’s Republic of China (PRC). On Oct. 22, 2010, Shriver pleaded guilty to a one-count criminal … Continue reading
Russian Espionage: The Bear Is Back!
The uncovering of a Russian spy ring in the U.S. demonstrates that while the Cold War may have thawed, international espionage continues to thrive. Russia is fielding an army of spies in the U.S. that is at least equal in … Continue reading
Two Arrested in Massive iPad Hacker Attack
Two men have been charged today with allegedly hacking AT&T’s servers to obtain the information of 120,000 iPad users, including some boldface names like Hollywood mogul Harvey Weinstein, New York Mayor Michael Bloomberg and President Obama’s former chief of staff. … Continue reading
Hackers Can Use Smart Keys To Steal Cars!
Modern smart keys use radio frequencies to let drivers unlock and start a vehicle without fumbling with a key fob. Now European researchers have found such systems can be hacked, letting thieves easily steal your car. While many of the … Continue reading
iPhone and Android apps are breaching the privacy of smartphone users (but nobody is saying where your personal data is going)
Any time Angry Birds or Yelp is opened on a smartphone, information is being sent to marketers — and app developers aren’t required to reveal it. Apps running on the iPhone, Android and BlackBerry platforms often collect personal information to … Continue reading
DARPA launches “insider threat” detection effort
The Defense Advanced Research Projects Agency (DARPA) has launched a project for detecting and responding to insider threats on Department of Defense networks. Under the Cyber Insider Threat (CINDER) Program, DARPA will explore new approaches for improving the speed and … Continue reading
Kama Sutra presentation opens backdoor to hackers
A booby-trapped Kama Sutra-themed presentation will plant a backdoor when run on Windows machines, security watchers warn. From the Register (UK): http://www.theregister.co.uk/2011/01/12/powerpoint_backdoor_trojan_wheeze/ The supposed PowerPoint presentation file – called Real kamasutra.pps.exe* – supposedly demonstrates different sexual positions. The file does … Continue reading
Miami-Dade police buy unmanned surveillance drone to watch over the city
The Miami-Dade Police Department is poised to become the first large metro force using drones in its aerial missions. The department finalized a deal to buy a drone called T-Hawk from defense firm Honeywell and officially applied for permission from … Continue reading