Hits and Misses
In our excitement over the prospect that our refrigerators will soon be able to order milk for us as soon as they know we’ve run out, we often forget about the darker side of the Internet of Things. Embedded systems promise convenience, but they can be hacked like any other computer, and though it sounds bad if someone can Read More
Yesterday, a rumor surfaced on deep web blog DeepDotWeb that Comcast was going to start blocking users of Tor, an anonymous web browser. Comcast Vice President Jason Livingood immediately and rightfully called bullshit, because for all of its customer service foibles, Comcast knows that preventing people from browsing the Internet anonymously would be a daring infringement on user privacy.
The confusion came to rest shortly after the posting of a Business Insider story called “Comcast Denies It Will Cut Off Customers Who Use Tor, The Web Browser For Criminals.” Besides reaffirming the simple notion that you shouldn’t just believe something you read on a subreddit, the story — which was viewed over 22,000 times — reaffirms the notion that Tor is a tool for evil.
When the world found out about the Heartbleed bug, cybersecurity specialists called it “catastrophic” in a way the Internet had never seen. Thank god they got that bug patched up in a matter of a day or two. Oh, wait, never mind.
As it turns out, 97 percent of the 2,000 largest publicly traded companies Read More
When cybercriminals started turning up the heat on American banks, New York Governor Andrew Cuomo ordered a full audit of New York’s banks and their cybersecurity. The Department of Financial Services (DFS) released their report yesterday, and the diagnosis is dire.
The biggest problem with financial cybersecurity, the report says, isn’t a lack Read More
As cloud service companies battle it out for supremacy, one file sharing service sets itself apart by skipping the cloud altogether. It’s called BitTorrent Sync, and starting this week, it’s going to be available through Netgear’s native app store.
Sync is like a cloud storage solution, only with no actual cloud storage involved.
Cloud services like Dropbox and Google Drive keep your data in a central online database that you can access from any device — for example, you can work with files on your tablet or laptop, and when you switch over to your PC, the files will still be accessible.
Dropbox announced on its blog yesterday that they’re “growing their leadership” by bringing Condoleezza Rice, former Secretary of State for the Bush Administration, onto their Board of Directors.
Many in the tech world are calling it a serious misstep, and a slew of headlines are quick to remind us that she is a “Read More
Credit Where Credit Is Due
Cloud storage services like Drive, Dropbox, and OneDrive are a growing part of American business. But these services are like other password-protected accounts you have — for anyone storing something sensitive, they leave your storage as vulnerate to phishers and black hats as your Facebook or Twitter accounts.
Enter Read More
The US has been behind the rest of the world for years in credit card technology, and now New York could lead the way toward catching up. A new bill in the State Senate would require all credit cards issued in the state to have EMV smart chip technology.
Smart chips are Read More
Hack Hack Hack Hack It Apart
After several months of near-constant chatter about Chinese hackers, the U.S. government has finally come right out and said it: the Chinese military is probably, right this very minute, trying to hack into America’s computers to steal our
precious bodily fluids state secrets.
That’s from the Pentagon’s annual report to Congress which, as the New York Times reports, was unusually direct in accusing China of hax0ring America’s shit. For example:
Devices like security cameras, traffic light systems, and high tech temperature controls can all be connected to the web, but they aren’t indexed by Google, which makes them difficult to find without deep computer expertise. Now SHODAN, a search engine that crawls the web for devices like routers, webcams and servers, is helping to expose some of the security flaws inherent to these devices.