Search
Close this search box.

‘The Horse is Out of the Barn’ on Government Control of Encryption

Controlling the development and deployment of strong encryption may have once been a possibility for intelligence and law enforcement agencies, but those days have passed and will not return, current and former U.S. intelligence officials said Tuesday. The current version of the encryption debate has much to do with the desire of law enforcement agencies and […]

Hackers Activate Tesla’s Brakes From Miles Away

The amount of technology packed into modern cars is kind of amazing. Just a few years ago, the most advanced thing in most vehicles was the cell phone in the user’s pocket. Now, many cars have computer-controlled engines, brakes, entertainment systems, and communications. Cool. The downside of this revolution is that some of these systems can […]

Fighting Account Takeover Attacks With AuthTables

The goal of many attackers is taking over a target account. That can be the account of an admin at a large enterprise, the bank account of a high net-worth victim, or the email account of a human rights activist. While banks and financial services companies are aware of the problem, many other organizations aren’t, […]

Experts Question Legality of Government Hacking

The emergence into the public consciousness of government hacking techniques and activities in recent years has sparked an increasingly loud debate over how and when law enforcement agencies should be allowed to employ these tactics. But that conversation ignores the fact that these techniques may not actually be legal, experts say. Law enforcement agencies, especially the […]

Cisco Warns of Second Firewall Bug Exposed by Shadow Brokers

Cisco is scrambling to patch another vulnerability in many of its products that were exposed as part of the Shadow Brokers dump last month. The latest vulnerability affects many different products, including all of the Cisco PIX firewalls. The latest weakness lies in the code that Cisco’s IOS operating system uses to process IKEv1 packets. […]

The FBI Wants Your Ransomware Infection Story

As ransomware infections have spread through enterprise networks and infected millions of consumer devices, security experts and law enforcement officials have continued to search for answers. Now, the FBI is asking for victims who have been infected to come forward and detail their issues as a way for the agency to get a better understanding of […]

Mobile Carriers Move to Address Robocalls

The robocall problem long ago spread to mobile phones, but mobile carriers have been somewhat slow to react and address the issue. Sprint this week has taken a step to rectify that by announcing a plan to integrate enhanced caller ID features into its offerings. The company announced Wednesday that it will be integrating technology […]

Researcher Bypasses iOS Passcode Limit With NAND Mirroring

Using easily available and inexpensive parts, a security researcher has been able to bypass the passcode retry restrictions on an iPhone 5C through hardware mirroring of the NAND memory. The researcher’s technique involved several steps and quite a bit of patience and work, but eventually Sergei Skorobogatov of the University of Cambridge in the UK was able […]

The Top 10 Takeaways from Tuesday’s Webinar

Aite Group, an independent research and advisory firm focused on business, technology, and regulatory issues, interviewed 25 executives at 18 of the top 40 largest U.S. financial institutions based on asset size in order to provide an accurate evaluation of the most effective technology solutions to protect against fraud. On Tuesday, Aite’s Senior Analyst, Shirley […]