The one thing you’ve always been certain of is that a computer that’s not connected to a network, doesn’t munch data from any USB sticks, and doesn’t accept any kind of electronic connection requests is reasonably safe against hackers and crackers breaking into its electronic vaults.
ReadyForce and SignalFire are co-hosting the second University Hacker Olympics from September 13-15 in what they claim is “the most epic university hackathon ever.”
The company says it is “completely overhauling our developer systems, updating our server software,” to prevent similar threats in the future.
Editor’s Pick “It can essentially take over the normal functioning of the phone and control any function,” Bluebox CTO Jeff Forristal posted.
A staggering 267,259 mobile apps are triggering SMS trojans, exploiting security holes, stealing private data, and building botnets, according to a study released today by security firm Juniper.
You gotta love security geeks — they can make it so easy for you. At least, if you’re a black hat hacker.
This is how you know you’re not at an Apple conference. At Google I/O today, Google’s holding a session on voiding your Google Glass warranty.
Have you noticed that the global internet is slowing down as it experiences its “biggest-ever” attack by hackers flooding the web via distributed denial of service attacks (DDOS)?
Millions of people use EA’s Origin service to play SimCity, Battlefield 3, and more. Security firm ReVuln claims they are vulnerable to attack from hackers.
“It looks like Andew got slammed into a desk by federal agents while trying to hand his phone to his lawyer after the court asked for his phone,” his publicist told me via email.
“It’s a f*cking ludicrous charge,” Auernheimer told me this morning from New Jersey. “The FBI has tried to frame me for terrorism five times, and by their own admission they’ve been surveilling me since I was 15 years old.”
Yesterday, Zendesk was hacked and the personal information of an unknown number of Twitter, Pinterest, and Tumblr users was stolen. Last year, 12.6 million U.S adults were the victims of identity fraud.
A security breach at cloud-based customer support vendor Zendesk has exposed personal information including email addresses of Twitter, Pinterest, and Tumblr clients, the company said today in a blog post.
Amazon’s homepage went down for 51 minutes this afternoon in a highly unusual outage.
“It’s a critical part of the Ruby infrastructure,” the programmer said. “Everything depends on RubyGems.”
One Canadian computer science student has discovered the three simple steps to ruining your life.
Editor’s Pick “Prosecutors do not acknowledge nuance,” Watt told me today. “They turn everything into a very clear-cut moral issue, where everything is nicely packaged into a premeditated act.”
The maker movement is in full effect. Step 1 was the hackerspaces of the 2000s. Step 2 is the DIY democracy at places like TechShop.
This is a I-screwed-up post. And it’s a clear-the-air post.
iPhones hear the name “Charlie Miller” and run, Siri screaming her mortal fear. Now Twitter employees will hear the name “Charlie Miller” and will know their hacker coworker is securing the company’s mobile apps.
Editor’s Pick Ready for the most outlandish story of your morning? Here we go. Today, a hacker allegedly stole Mitt Romney’s tax returns, is demanding $1 million in Bitcoins for silence, and sent a USB drive and letter to the GOP and Democratic party offices in Williamson County, Tennessee as proof.
Mobile malware has exploded this year, growing almost 700 percent over 2011 numbers. Almost all of it, perhaps 85 percent, targets smartphones running Android.
Editor’s Pick OpenROV, a mini submarine developed in a Silicon Valley garage, has been hailed by the world’s media as the key to unlocking the earth’s last frontier.
[youtube=http://www.youtube.com/watch?v=doaz9EGpm04&w=560&h=420] An aspiring hardware hacker at Twilio has used his company’s own telephony APIs as well as Node.js and Arduino to build the charming robot you see in the clip above.
Github, the service that many professional programmers use to store their work and collaborate on coding, was hacked over the weekend. A young Russian named Egor Homakov showcased a loophole in Github that would allow anyone to commit to the master copy of a project, meaning they could alter or delete the source code. But when his account was suspended by Github, a furious argument broke among developers out about his intentions. Was he doing the community a service by exposing the flaw or taking things too far with a very public hack?
Kevin Mitnick was once labeled the world’s most wanted hacker. Back in 1992, he tangled with a mystery hacker named Eric, setting off a duel that led to a chain of events that spun out of control.
The smarter water meters become, the easier they’re getting to hack. Like many things in electronics, water meters become easier for hackers to break into and misuse when they are upgraded to include wireless and computer technology.
A seasoned security hacker who spent seven months figuring out how to hack a laptop battery disclosed his findings today at the Black Hat security conference. Charlie Miller, who specializes in hacking Apple software, figured out how to remotely control a battery and do some damage to it such as “bricking it” – or incapacitating it – from afar.
When Google first started talking about its Google Chrome OS software a few years ago, one of the selling points was the promise that it would come with much better built-in security than other operating systems. Now, Chrome OS has only been commercially available for a few months, and security researchers have already figured out how to hack it.
Sony said yesterday that all credit card information on its hacked PlayStation Network was protected with encryption. As the outage for the online game service for the PlayStation 3 entered its eighth day, the company sought to reassure angry users.
Sony says that 21-year-old George Hotz, the hacker who reverse-engineered the security system for the PlayStation 3, has fled the country to South America rather than face a court over charges that he destroyed evidence.