shutterstock_83488540-580
01 Sep 2015

Your Computer is Part of a Robot Army

You have already welcomed our robot overlords. I’m not saying this to be mean, and I doubt that you’re a willing traitor to the human race. Nonetheless it is very likely that the machines in your house — your desktop, laptop, and router, possibly even your thermostat or your television

0 Read More
shutterstock_145177858
11 Aug 2015

Stagefright: The Pain is Just Beginning

I’ve previously discussed the extremely primitive state of mobile security, and really, it is like the picture of Dorian Grey — as your phones get newer and faster and shinier, the software under the hood gets older and weaker and more vulnerable. The Stagefright bug, affecting 950 million Android phones,

0 Read More
laptop-coneccted-car-shutterstock
04 Aug 2015

Hackable Cars: Overhyped?

The internet went into an uproar last month, as Wired, in conjunction with security experts Charlie Miller and Chris Valaskek, demonstrated a hack that could take control of a Jeep Cherokee mid-drive. The researchers completely owned the car, taking control of the radio, windshield wipers, transmission, steering, and brakes. What’s

0 Read More
shutterstock_189107936
28 Jul 2015

Flash From The Past – Why It’s Time For Flash To Die

If you’re from a certain generation of internet users — I’m looking at you, Millenials — one of your first experiences of using the internet probably involved Flash. The program started as a simple animation tool, and it was a staple of the internet from 1996 to roughly 2010, used

0 Read More
shutterstock_194513009
07 Jul 2015

Zero Day – The Global Market For Security Exploits

I’ve previously written about why everything is so easy to hack. I’ve come at the issue from two sides. On one side, the organizations that are targeted don’t understand how to defend themselves. On the other side, governments are building powerful teams of hackers that can break the most powerful

0 Read More
SB
24 Jun 2015

Advanced, Persistent, Threatening: How APTs Work and Why We Can’t Stop Them

Some companies deserve to get hacked. They do stupid things. They leave the default password on an internet connected device, they turn off automated warnings on their security software, or they store unencrypted customer data. Those are some of the cardinal sins of information security, and anyone who commits them

0 Read More