There's an old mantra in the security world that anything can be hacked. And the more complex our devices become, the more methods hackers dream up to break into them. Case in point: A team of researchers can use sound waves to control anything from a smartphone (seriously) to a car (theoretically).
Tagged With hacking
Even though the news is only a few hours old, some are already starting to wonder if the big WikiLeaks release of CIA hacking documents revealed anything "technically surprising". Well, how about this: CIA hackers are obscenely well-versed in Japanese one-line ASCII art.
There isn't much funny about the CIA's covert hacking operations or the WikiLeaks dump that put thousands of documents about them on the internet on Tuesday. Some of the secret code names for these operations are pretty funny, though. Those spooks at Langley must have a sense of humour.
Here we go again, gumshoes. WikiLeaks (read: Julian Assange) says it acquired a massive cache of CIA documents related to the agency's cyberwar efforts. The information therein, WikiLeaks claims, reveals covert CIA hacking tools that can take over iPhones, Android phones, TVs and pretty much any type of computer. It's scary stuff — if you believe what WikiLeaks is saying is true.
US federal prosecutors have dropped all charges against a Washington man who allegedly downloaded explicit photos of minors from Playpen, a popular child pornography site on the dark web that was briefly run by the FBI.
News flash: you don't need to take out exorbitant student loans to master a new skill. With The Super-Sized Network Security Mastery Bundle, you can set yourself up for a lucrative career taking down hackers - without the crippling student debt.
Late last year, top cybersecurity investigators from a private firm and Russian intelligence were arrested in dramatic fashion. One was dragged out of a meeting with a bag over his head. All were disappeared. Details were scarce at the time, but revelations from a new Reuters report now only complicate what we know.
Huge security disasters like Cloudbleed are never fun. However, as more information about the newly reported vulnerability becomes available, we can understand how dangerous bugs stand to screw up the internet. Luckily, in the case of Cloudbleed, it's not as bad as it could have been. But it's not good, either.
Remember the recent reports about how President Trump is still using his unsecured Android phone? Well, that situation just got scarier now that the White House's chief information security officer reportedly no longer has a job.
You don’t need to go back to school to switch up your career path. Instead, start mastering in-demand skills like web development, ethical hacking, and more...straight from your computer. The best part? You won’t have to spend a lot of cash to do it: use the LEARN70 coupon code at checkout, and you can get any course in this online collection for 70% off.
In a party line vote, the US House Administration Committee voted yesterday to kill the Election Assistance Committee, which sets federal standards for voting technology. If the bill becomes law, it could affect efforts to protect US elections from cyber attacks, further indicating that Republicans aren't all that bothered by the threat of election hacking.
As more and more things become connected to the internet, they all become more susceptible to hackers. So it should come as no surprise that even state-of-the-art hotel lock systems are now getting ransomed. Hackers recently penetrated the security system of a four-star hotel in Austria, leaving the hotel unable to create new keys. The system was only restored after the hotel agreed to pay a ransom in Bitcoin.
In the wake of recent cyberattacks on Sony and even during the U.S. presidential election, it’s clear that cybercriminals can deal crushing blows to virtually anyone. So, it’s no wonder why demand is skyrocketing for cybersecurity experts, and you can join their ranks with the Comprehensive Cyber Threat Analysis training bundle.