Government Employee Sextorting and Cyberstalking at Work

How much free time do government employees have at work? Well Michael C. Ford a former State Department civilian employee had too much time. From his desk at the embassy in London between January 2013 and May 2015 Ford used a government computer to hack 450 private email accounts and sextort 75 women. Ford has…

WhatsApp Encryption Makes iPhone Small

The D.O.J. versus Encryption; this may have been the biggest case regarding personal privacy in the digital age, and it went undecided. Rather than force the court to make a ruling the D.O.J. withdrew their petition because the F.B.I. found a way to hack the iPhone. But in the tech industry the fall out is…

Custom Backdoor Hack Goes Undetected For Years

Establishments in Taiwan, Japan, South Korea and the U.S. have been attacked by a newly discovered Malware called Dripion. Dripion is a custom program that creates a back door into computers. It is installed through another malicious software called Blugger. Blugger, using encryption to hide its communication, downloads Dripion from English-language blogs. The blogs could…

EU Parliament Net Neutrality Bill Full of Holes

The European Parliament passed a new bill preventing Internet service providers from blocking Internet traffic, but allows service providers to block or restrict traffic when required by law, or “necessary to manage congestion”. And what is or isn’t congestion is decided by the service providers. The bill allows the same service providers to offer different…

John Oliver’s Call To Arms

John Oliver’s report about net neutrality sending a call to arms for all commentators to send there comments to the FCC caused  the FCC website to crash. I usually only report the facts but I have to say about Oliver’s editorial: FUCK YEAH!!!!! Watch the video here.

Linux Worm Attacks ‘Things’

Linux.Darlloz, in addition to being able to attack Linux computers, has the ability to target small devices attached to the internet. Vulnerabilities in chips used in home routers, security cameras, set-top boxes like Apple TV, Roku, cable boxes and etc. and even industrial controllers are susceptible to this worm. The devices above utilize Linux services to…

Cracked[dot]com Spreads Malware

On Monday, November 11th, it was discovered that Cracked[dot]com was infected by malware performing drive by downloads. The discovery comes from Barracuda Labs Research. The malware was spread through a drive-by-download. The number of systems it has infected is unknown. Given the site is ranked by Alexa as number 289 in the U.S. and 654 worldwide the…

FBI Needs Help

The FBI needs help prosecuting Vladimir Tsastsin. Just over a year ago Tsastsin and six of his cohorts were arrested in Estonia charged with running a click fraud scheme that infected more than four million computers in over 100 countries — an estimated 500,000 of those PCs in the United States.  The defendants are suspected of using…

Browser Security

After email the most common source of Malware infections is through your internet browser. So securing your browser is a great way to defend against Malware and protect your privacy. This is the first in a series of tips to help our readers protect themselves. This first tip will focus on general practices. Subsequent tips…

Google Improves Chrome Security

Google has been paying attention to its forums, which has been riddled with reports of Chrome falling victim to browser hijacking malware. Google responded with two new browser features. The first is a “reset browser settings” button. Under the “Advanced Settings” section you will find this button which will set your browser back to its…