A small device plugged into one of several popular IP phone models can turn the phones into secret listening devices, according to research funded by a grant from the Defense Advanced Research Projects Agency (DARPA), an arm of the Defense Department devoted to computer security, reports NBC...
One hot new trend among the cybercrook set in the UK is to slap a sticker with a QR code onto an otherwise innocuous poster. The imposter QR code, posing as a way to get more info on an innocent topic, actually takes unsuspecting smartphone users to a malware-infected or phishing site. One...
Last Friday Mathew Honan, a tech reporter with Wired.com, experienced a hacking incident that perfectly illustrates the vulnerabilities we expose when we rely on cloud services, linked accounts, and — especially — use of one favorite master password for multiple accounts. There's another...
Dropbox, the popular cloud storage service, today contacted users and announced on its blog that a few of its users' accounts had been accessed via usernames and passwords stolen from other sites. In addition to helping the owners of the breached accounts secure their data, Dropbox has introduced...
Many business owners mistakenly believe they are under the radar of cyber criminals, thinking they are just too small to be worth the time. But that's absolutely wrong, according to a recent Wall Street Journal article, Cybercriminals Sniff Out Vulnerable Firms. The article tells the story of...
Enjoy the Games, but Use Caution, Common Sense Online Cybercriminals might use the 2012 Summer Olympic Games as an opportunity to ramp up malware, scams, data theft and DDoS attacks, as well as a platform for high-profile "hacktivism," warns a May 17 report released by the Department of Homeland...