Google Glass spyware can use users as surveillance drones By John Leyden Security researchers have created prototype Google Glass spyware that is capable of snooping on everything the user is looking at without tipping off victims that anything is amiss…. Read More ›
John Leyden
Mystery traffic redirection attack pulls net traffic through Belarus, Iceland
There’s something happening here. What it is ain’t exactly clear. By John Leyden Posted in Security, 22nd November 2013 13:58 GMT Tons of internet traffic is being deliberately diverted through locations including Belarus and Iceland, and intercepted by crooks or worse,… Read More ›
Call yourself a ‘hacker’, lose your 4th Amendment right against seizures
Court rules coder’s PC can be snatched in ‘software knockoff’ spat By John Leyden Posted in Law, 23rd October 2013 23:19 GMT A US district court has ruled that anyone calling themselves a “hacker” loses their Fourth Amendment protections… Read More ›
Easily picked CD-ROM drive locks let Mexican banditos nick ATM cash
Who needs an inside man when you’ve got a boot disc? By John Leyden 11th October 2013 15:12 GMT Lax security at Mexican banks has allowed cybercriminals to put their own malware-ridden CDs into ATM machines in order… Read More ›
Hardware powering the US Emergency Alert System can be easily tricked into broadcasting bogus apocalyptic warnings from afar
Emergency alert system easily pwnable after epic ZOMBIE attack prank Private crypto keys found in firmware – where were their BRRAAAIINNNS? By John Leyden Posted in Security, 9th July 2013 10:11 GMT Agentless Backup is Not a Myth Hardware powering… Read More ›
Smart Meters Easily Hacked and can shut down whole neighbourhoods
Crap computers in a crap box: Smart-meter blackouts risk to UK Sniff a device’s wireless, pwn a power plant, warns Brit biz By John Leyden Posted in Security, 30th April 2013 09:06 GMT Free whitepaper – Hands on with Hyper-V… Read More ›
Your phone may not be spying on you now – BUT it soon will be
Smash it with a hammer now, it’s the only way to be sure By John Leyden Posted in Security, 24th April 2013 10:04 GMT Free whitepaper – Hands on with Hyper-V 3.0 and virtual machine movement Infosec 2013 Tibetan political… Read More ›
Experts doubt Anonymous Mossad spy outing claims are kosher
Tinker, tailor, soldier, cobblers By John Leyden Posted in Security, 26th March 2013 12:56 GMT Free whitepaper – IT infrastructure monitoring strategies Hacktivists claim to have published leaked data on more than 30,000 Israeli officials, including members of Israel’s Mossad… Read More ›
Bank of America accused of spying on Activist: “Even more amusing is the keyword list that was found, containing trigger words like ‘jihad’ or ‘homosexual’.”
Anonymous leaks ‘Bank of America secrets’ in spy revenge hack Hacktivists enraged by suggestion financial giant snooped on them By John Leyden Posted in Security, 27th February 2013 16:34 GMT Free whitepaper – IDC Report: Lost in the Cloud? Automate… Read More ›
Fed confirms but downplays Anonymous Superbowl banker hack
Sod that, Beyoncé is a member of the ILLUMINATI By John Leyden Posted in Security, 6th February 2013 16:03 GMT The US Federal Reserve has admitted that its systems were hacked during Sunday’s Superbowl, a breach that led to the leaking… Read More ›
Hackers on anti-Egypt spree bury Egyptology journal in the sand
Bystanders in online war blasted offline By John Leyden Posted in Security, 23rd January 2013 10:57 GMT Free whitepaper – Enabling Datacenter and Cloud Service Management for Mid-Tier Enterprises Hackers waging war against Egyptian websites have forced the closure of… Read More ›
Paging Dr Evil: Philips medical device control kit ‘easily hacked’
Homeland Security ‘taking an interest’ By John Leyden Posted in Security, 18th January 2013 17:03 GMT Free whitepaper – Enabling Datacenter and Cloud Service Management for Mid-Tier Enterprises Researchers have discovered security problems in management systems used to control X-ray… Read More ›
John McAfee the Belize spymaster uncovers ‘ricin, terrorist plots’
Tycoon: I gave bigwigs laptops stuffed with surveillance malware By John Leyden Posted in Security, 7th January 2013 15:04 GMT Free whitepaper – A Vision for the Data Centre Infosec daredevil John McAfee claims he became a spymaster in Belize after… Read More ›
Russian space research org targeted by mystery malware attack
Korean message forum becomes cyber-espionage hub By John Leyden Posted in Security, 12th December 2012 10:03 GMT Free whitepaper – A Paradigm Shift in Digital Asset Storage Security researchers have discovered a targeted attack against Russian hi-tech firm that appears to… Read More ›
Saudi Aramco: Foreign hackers tried to cork our gas output
Worm outbreak targeted oil giant’s sensitive machinery By John Leyden Posted in Security, 10th December 2012 14:56 GMT Free whitepaper – A private Cloud-based approach Hackers who used the Shamoon worm to attack oil giant Saudi Aramco were bent on… Read More ›
Who’s using ‘password’ as a password? TOO MANY OF YOU
Study of hacked websites reveals top 25 common passphrases By John Leyden Posted in Security, 3rd December 2012 12:37 GMT Free whitepaper – Gartner: Secure Web Gateway Malware Detection Techniques A study to find the top 25 leaked passwords of… Read More ›
Microsoft STALKS YOU even more than supermarkets do, says dev
Original URL: http://www.theregister.co.uk/2012/11/29/web_tracking/ Hey, get your tracker kit out of my trouser browser By John Leyden Posted in Security, 29th November 2012 12:57 GMT Free whitepaper – Gartner: Secure Web Gateway Malware Detection Techniques Web-tracking is rife on technology vendor websites,… Read More ›
Yahoo! email! hijack! exploit!… Yours! for! $700!
Cybercrook: It’s a bargain, guys… They usually cost way more By John Leyden • Get more from this author Posted in Security, 27th November 2012 10:58 GMT Free whitepaper – The Benefits of a Hybrid Security Architecture A cross-site scripting (XSS)… Read More ›
Cyber blaggers autoplunder bulging accounts on Euro pay network
‘Operation High Roller’ rascals in mass slurpening By John Leyden • Get more from this author Posted in Security, 23rd November 2012 06:27 GMT Free whitepaper – The Benefits of a Hybrid Security Architecture Cybercrooks have developed a Trojan that targets… Read More ›
Quantum crypto – with nothing more than STANDARD broadband fibre
Original URL: http://www.theregister.co.uk/2012/11/20/quantum_crypto_breakthrough/ Theoretical un-crackability cracked By John Leyden Posted in Security, 20th November 2012 17:58 GMT Free whitepaper – Blue Coat Systems 2012 Malnet Report Boffins have worked out how to run quantum cryptography systems over a standard broadband… Read More ›
Did hackers uncover Petraeus’ saucy affair webmails before FBI? And How they may of Hacked it
Engineering Evil: Need second confirmation Biographer minx previously exposed in Stratfor caper By John Leyden • Get more from this author Posted in Security, 12th November 2012 17:24 GMT FBI agents may not have been the first to rumble… Read More ›