If you think malware is the biggest threat to Internet security, perhaps you should think back to the last time you actually used a good, strong password. Two Google researchers recently submitted a paper to the IEEE Security & Privacy Magazine that argues that weak passwords are actually a bigger threat to online security than any of that malware embedded in those crappy porn sites you frequent.
Google’s proposed solution to the Great Password Scare of 2012-2013? Literally put a ring on it. Read More
Today in brilliant ideas: Verizon’s security blog tells the story of an employee at an unnamed company who decided to outsource his job to China so that he could “watch cat videos” all day.
When the company noticed that someone from China was using the VPN of the employee (named “Bob”) to login, they called their telecommunications company, Verizon, to investigate. Verizon initially thought it was some type of malware, but it turned out that the company just had an amazingly lazy genius on their hands. Read More
Did you receive an email this holiday season from a kind-hearted woman who just wanted to celebrate Christmas by sending random strangers pictures of herself in skin-bearing bikinis? Free noodz from an anonymous hottie seemed too good to be true! And indeed, it was.
Sure, being a James Bond-level spy is a glamorous job, one that most people would love to humblebrag about online. But if you’re a secret agent working in international espionage, you might not want to let people know about that on LinkedIn.
Flemish daily newspaper De Standaard reports that a simple search for “State Security” on LinkedIn pulls up a crop of spies who have copped to their “secret” jobs on the social network. This is essentially the Belgian equivalent of listing your position as “Top Secret Spy at the CIA” on LinkedIn. Read More
Just when you thought the story of antivirus king John McAfee–who’s wanted for questioning by Belizean police for the murder of his neighbor Gregory Faull–couldn’t get any stranger, dude goes and starts a blog about how he’s managed to evade police by posing as a dolphin carving peddler who sticks tampons up his nose.
In a blog called Who is McAfee?, which suspiciously resembles a marketing ploy for the upcoming graphic novel about his life The Hinterland, Mr. McAfee spares no details in describing exactly what it’s like to be on the run from authorities in Central America. Read More
Gmail has improved its search capabilities, making it possible to now search for emails by size or specific date parameters. This should make finding all those embarrassing emails you sent to your ex even easier. [Gmail Blog]
NY Senator Charles Schumer proposed an initiative yesterday that would create two new high school diplomas that focus on promoting high-tech industries. Gotta start ‘em young? [Press Connects]
The Queen of England prefers the Galaxy Note over the iPad for some unknown reason. [CNET]
Here’s something to alarm you before 9 a.m.: Mat Honan, the Wired writer who was famously hacked, on why passwords are basically useless in protecting your personal information. [Wired]
Americans are too prudish to get into the spirit of fancy butt-washing Japanese toilets. [Priceonomics]
Those who received an email from Twitter warning that they should reset their passwords might greet this admission in Twitter’s status blog with some irritation. Twitter admits: yeah, they kind of screwed that up.
Don’t get too mad, though–Twitter only had our best interests at heart. It’s just that in a fairly normal investigation of compromised accounts, someone at Twitter HQ may have gotten a little carried away: Read More
Superstorm Sandy washed and blew away some polling places and displaced thousands of residents in New York and New Jersey. New Jersey, in an effort to make sure every voice is heard, has enabled voting via email.
New York didn’t want to go with the email voting option because officials feel it might be vulnerable to fraud.
Writing in Norman’s “Security Exposed” blog, Norman’s vice president and GM Darin Andersen examines the problem of email voting.
Mr. Andersen writes that polling machines may have their own security problems but admits there hasn’t been reliable evidence of hacker interference in previous elections. However, Mr. Andersen is wary of email voting: Read More