The accumulation of automation and Internet-connected devices in many homes these days has led observers to coin the term smart homes. But as researchers take a closer look at the security of these devices, they’re finding that what these homes really are is naive. The latest batch vulnerabilities to hit home automation equipment are in the Tuxedo Touch[…]
Browsing Category: Uncategorized
The latest car hacking research from Charlie Miller and Chris Valasek has elicited a broad spectrum of reactions: admiration for the skill; outrage at the danger the demo may have put drivers; and even a patch from an automaker. And the EFF is hoping it might also help produce a new exemption to the Digital Millennium[…]
It turns out that Neiman Marcus, one of many retailers that announced it suffered a data breach last year, will indeed face a class action lawsuit which claims the upscale department store failed to protect its system from hackers.
Google is helping to lead a new effort to reduce the amount of fraudulent traffic that emanates from data centers and produces artificial clicks on ads. The collaborative initiative will rely on blacklists of known-bad IP addresses that Google and others maintain to help identify bots that are used in click fraud campaigns and other[…]
A group of lawmakers are proposing that victims of last month’s expansive Office of Personnel Management hack receive lifetime fraud protection and credit monitoring.
A third party operator of concessions and retail services at zoos from Hawaii to Florida acknowledged this week that it was hit by a data breach earlier this year.
A prominent member of the EU parliament, who has been outspoken on security and privacy issues, on Tuesday submitted a written list of questions to the European Commission about the actions of Hacking Team and whether the company had violated EU sanctions regarding sales to specific countries. Marietje Schaake, a Dutch member of the European[…]
Harvard University warned students of a data breach that may have exposed school network and email logins.
Amazon’s home grown TLS implementation called s2n (signal to noise) was released to open source. s2n is a mere 6,000 lines of code and will be integrated into a number of Amazon Web Services.
An undisclosed number of travelers who use Hotels.com may have been victims of a phishing scheme.