If Facebook promised you naked videos of your friends, would you click? As much as you may be tempted to find out why your former 8th-grade computer lab partner is sending you a racy video selfie, beware: it is, of course, a scam.
Microsoft’s Response Rate to Law Enforcement Requests Stays Steady
Microsoft once again gave up only a small percentage of content data to law enforcement agencies that asked for it in the last six months of 2013. Only 2.32% of requests from police and other organizations globally resulted in disclosure of data regard…
So Where Are Mt Gox’s Stolen Bitcoin Millions?
The question repeatedly asked by the bitcoin community since Mt Gox announced that all of its bitcoins had been stolen by hackers, is where have they gone? While bitcoins do not reveal their owners, their use can be tracked via blockchains – and there …
Is Getty’s Image Embedding Tool a Trojan Horse?
Getty Images has a reputation for being a copyright maximalist. It has sued breaches of copyright, and lobbied Congress for stricter copyright legislation. So when the world’s largest collection of photos – in excess of 80 million still images – declar…
Is Getty’s Image Embedding Tool a Trojan Horse?
Getty Images has a reputation for being a copyright maximalist. It has sued breaches of copyright, and lobbied Congress for stricter copyright legislation. So when the world’s largest collection of photos – in excess of 80 million still images – declar…
Europol Urges Caution with Public Wi-Fi
Criminal theft of private data from public Wi-Fi hotspots is not new, but is increasing. The two most prevalent methods are traffic sniffing and man-in-the-middle attacks using a rogue, criminal-controlled hotspot. Talking to the BBC, Europol has warne…
Dendroid RAT: the Next Stage of Android Malware Evolution
Close on the heels of the discovery of an Android remote administration tool (RAT) known as AndroRAT – believed to be the first ever malware APK binder – comes a new variant of the idea, dubbed Dendroid.
Stuck in a Jam: Smucker’s Suffers Data Breach
For the JM Smucker jam and jelly company, life isn’t so sweet at the moment: attackers have managed to get into the company’s online ordering system, lifting personal information on customers. In the aftermath, the company has shuttered its online stor…
Patch Tuesday Preview: March 2014
This month’s Patch Tuesday is light, containing just five bulletins. Two are marked critical and three are marked important. One of the critical bulletins addresses Internet Explorer, and is believed to include a fix for the zero-day vulnerability high…
Worms and Wildly Insecure Software: The Untold Story of Microsoft Cybersecurity in the Early 2000s
It was post-dot-com bubble and post-Worldcom implosion, and the so-called “telecom winter” was dragging on. In the early 2000s, the communications industry had, in a word, been economically decapitated, and companies were struggling to find a new path …