
Your Computer is Part of a Robot Army
You have already welcomed our robot overlords. I’m not saying this to be mean, and I doubt that you’re a willing traitor to the human race. Nonetheless it is very likely that the machines in your house — your desktop, laptop, and router, possibly even your thermostat or your television

Stagefright: The Pain is Just Beginning
I’ve previously discussed the extremely primitive state of mobile security, and really, it is like the picture of Dorian Grey — as your phones get newer and faster and shinier, the software under the hood gets older and weaker and more vulnerable. The Stagefright bug, affecting 950 million Android phones,

Hackable Cars: Overhyped?
The internet went into an uproar last month, as Wired, in conjunction with security experts Charlie Miller and Chris Valaskek, demonstrated a hack that could take control of a Jeep Cherokee mid-drive. The researchers completely owned the car, taking control of the radio, windshield wipers, transmission, steering, and brakes. What’s

Flash From The Past – Why It’s Time For Flash To Die
If you’re from a certain generation of internet users — I’m looking at you, Millenials — one of your first experiences of using the internet probably involved Flash. The program started as a simple animation tool, and it was a staple of the internet from 1996 to roughly 2010, used

Zero Day – The Global Market For Security Exploits
I’ve previously written about why everything is so easy to hack. I’ve come at the issue from two sides. On one side, the organizations that are targeted don’t understand how to defend themselves. On the other side, governments are building powerful teams of hackers that can break the most powerful

Advanced, Persistent, Threatening: How APTs Work and Why We Can’t Stop Them
Some companies deserve to get hacked. They do stupid things. They leave the default password on an internet connected device, they turn off automated warnings on their security software, or they store unencrypted customer data. Those are some of the cardinal sins of information security, and anyone who commits them