Blogs: Security

Security news, opinion, reviews and more

Jacob Creech

Spam spam spam spam. Spam spam spam spam. Wonderful spam.

For many users, iMessage is becoming an unusable cesspool of spam. Apple (NASDAQ:AAPL) is under fire for poor security design in iMessage, and for failing to react to the (inevitable) spam problem that has ensued.

smh. Why do we keep having to reinvent the wheel, every single freakin' time a new communications tool becomes popular? In IT Blogwatch, bloggers eyeroll furiously. Not to mention: Bloody Vikings

August 21, 2014 6:08 AM EDT

This company decides to give its board members iPads so they can review confidential reports and requests prior to each monthly meeting. They're even trained to encrypt emails. And how does that work out?

August 20, 2014 6:00 AM EDT

This pilot fish has a batch of Windows 7 laptops to configure so that their users will be required to use Ctrl-Alt-Del to log in. But once he finds where to make the change, he's confused.

August 19, 2014 6:00 AM EDT
Image credit: berrytokyo

Pen testers cracked the security of every IoT device within a smart house. Other researchers scanned the Internet and grabbed 30,000 screenshots in an hour of PCs running VNC without a password. Moral of the story? Change default usernames and use a strong password.

August 18, 2014 12:53 PM EDT
Image credit: loops7

Computrace software, which is enabled by default on millions of PCs, could allow attacker to remotely wipe the hard drive. Researchers described the "backdoor" in BIOS/UEFI, as well as how it can be exploited at Black Hat USA. Although the suggested threat mitigation is the deactive Computrace, that's not always possible.

August 13, 2014 10:03 AM EDT
Image credit: Cryteria / MorningLemon

No, the Nest thermostat can't be remotely hacked. But you might think twice about buying one from somewhere other than Nest since a persistent backdoor can be added in about 15 seconds...a backdoor that you would have no way of knowing was there and was being used against you.

August 11, 2014 11:25 AM EDT
Image credit: Jan Prucha

70% of the 10 most popular types of Internet of Things “smart” devices are vulnerable to being hacked, with multiple attack vectors averaging out to about 25 security vulnerabilities per IoT device. There is also almost no regard for privacy via securing your personal or sensitive info in the device, the accompanying app or the connected cloud service.

August 04, 2014 11:32 AM EDT

Tech support pilot fish works at a college where student organizations are supplied with computers -- which makes security a challenge.

July 31, 2014 6:00 AM EDT
Image credit: Lionsgate

A pirated DVD-quality version of The Expendables 3 is the wild, several weeks before the film debuts in theaters. The leaked film ranked as the #1 most-pirated movie of the week. But if you are into streaming movies instead of downloading torrents, then you might be interested to know that the Justice Department wants to make "unauthorized" streaming a felony.

July 28, 2014 12:01 PM EDT
Image credit: Kafeine

Critoni is a new ransomware that has been spotted in the wild. Also dubbed as CTB-Locker (Curve-Tor-Bitcoin Locker) on forums frequented by cyber thugs, the ransomware uses Tor and is being touted as a more powerful version of Cryptolocker. This might be a wise time to backup your data.

July 21, 2014 4:17 PM EDT