Spam spam spam spam. Spam spam spam spam. Wonderful spam.
For many users, iMessage is becoming an unusable cesspool of spam. Apple (NASDAQ:AAPL) is under fire for poor security design in iMessage, and for failing to react to the (inevitable) spam problem that has ensued.
smh. Why do we keep having to reinvent the wheel, every single freakin' time a new communications tool becomes popular? In IT Blogwatch, bloggers eyeroll furiously. Not to mention: Bloody Vikings…
This company decides to give its board members iPads so they can review confidential reports and requests prior to each monthly meeting. They're even trained to encrypt emails. And how does that work out?
This pilot fish has a batch of Windows 7 laptops to configure so that their users will be required to use Ctrl-Alt-Del to log in. But once he finds where to make the change, he's confused.
Pen testers cracked the security of every IoT device within a smart house. Other researchers scanned the Internet and grabbed 30,000 screenshots in an hour of PCs running VNC without a password. Moral of the story? Change default usernames and use a strong password.
Computrace software, which is enabled by default on millions of PCs, could allow attacker to remotely wipe the hard drive. Researchers described the "backdoor" in BIOS/UEFI, as well as how it can be exploited at Black Hat USA. Although the suggested threat mitigation is the deactive Computrace, that's not always possible.
No, the Nest thermostat can't be remotely hacked. But you might think twice about buying one from somewhere other than Nest since a persistent backdoor can be added in about 15 seconds...a backdoor that you would have no way of knowing was there and was being used against you.
70% of the 10 most popular types of Internet of Things “smart” devices are vulnerable to being hacked, with multiple attack vectors averaging out to about 25 security vulnerabilities per IoT device. There is also almost no regard for privacy via securing your personal or sensitive info in the device, the accompanying app or the connected cloud service.
Tech support pilot fish works at a college where student organizations are supplied with computers -- which makes security a challenge.
A pirated DVD-quality version of The Expendables 3 is the wild, several weeks before the film debuts in theaters. The leaked film ranked as the #1 most-pirated movie of the week. But if you are into streaming movies instead of downloading torrents, then you might be interested to know that the Justice Department wants to make "unauthorized" streaming a felony.
Critoni is a new ransomware that has been spotted in the wild. Also dubbed as CTB-Locker (Curve-Tor-Bitcoin Locker) on forums frequented by cyber thugs, the ransomware uses Tor and is being touted as a more powerful version of Cryptolocker. This might be a wise time to backup your data.