National Highway Traffic Safety Administration (NHTSA) has released best practice guidelines for vehicle cybersecurity. Guidelines are aimed to car makers and their purpose is to help improve car security. However, 22 pages document is non-binding – there’s no regulatory imperative requiring that car makers meet these standards. Full article and guidelines
UK’s National Audit Office (NAO) has found that government has breached personal data security nearly 9,000 times in a year. Most of breaches – about 6,000 – are on HMRC. NAO found that 17 largest departments recorded 8,995 data breaches in years 2014-2015, but reported to the Information Commissioner (ICO) only 14 incidents. Although not […]
A hackers group that calls itself the Shadow Brokers recently published on web and made accessible to everyone sophisticated hacking and surveillance tools. They claim that those tools come come from breach of NSA. Released hacking tools exploit vulnerabilities in software that the vendor doesn’t know about (so called “zero day vulnerabilities”) and thus haven’t […]
Spotify is making some users reset their passwords and the reason is – other websites keep getting hacked. There have been numerous huge data breaches affecting tens of millions of users. Situation is even worse because of the fact that many people re-use their passwords across many services. So breach of one service where password was re-used compromises other sites […]
It is estimated that by year 2020 there will be anywhere up to 50 billion internet-connected devices and 20% of them will be cars and or trucks. Such rapid explosion of use of connected devices explodes comes with security risks. Therefore US Department of Justice, together with other agencies, is evaluating and trying to predict those risks […]
Manual of Harris Corp.’s surveillance device shows how police can spy on phones. Stingray devices can track phone’s connection to the simulated tower, information about its location, and certain “over the air” electronic messages sent to and from them. And that’s at minimum. Full story
This article explains three commonly used security terms for non-technical people. Those terms are: “encryption”, “OAuth and OAuth2”, and “ransomware”. Full article
“Visual hacking” is spying on physical items: like overlooking someone’s computer or mobile screen, desk, paper documents. These attacks are hard to notice and detect when it does happen. Kate Borten of the Visual Privacy Advisory Council shares her tips on how to secure against visual hacking. Full article
This article tries to shed some light on how identity theft and the second life of stolen identities. Stolen identity information is freely available on Darknet. Unfortunately, there is little individuals can do to protect themselves from identity thieves lurking on the Darknet to do them harm. For organizations, the best strategy is to educate […]