The Latest in IT Security

1

More and more shopping Web sites accept cryptocurrencies as a method of payment, but users should be aware that these transactions can be used to deanonymize them – even if they are using blockchain anonymity techniques such as CoinJoin.

Read more ...

1

If anyone still has doubts that the US Central Intelligence Agency (CIA) can track nearly anyone, anytime, anywhere, a new Vault 7 disclosure from WikiLeaks may dispel them. The CIA likely used malware codenamed ELSA to pinpoint and, presumably, track target Windows users over long periods, by hacking into WiFi radios on laptops – even when not connected to the Internet.

Read more ...

1

The mobile application that accompanies many Hyundai cars exposed sensitive information that could have allowed attackers to remotely locate, unlock, and start vehicles.
The vulnerability was patched in the latest version of the mobile app released in March but was publicly disclosed on Tuesday.

Read more ...

1

Julian Assange, Wikileaks’ founder and Russian propagandist, must be proud of himself. In his latest “revelation” that the Central Intelligence Agency can hack Apple and Android smartphones, PC operating systems and smart TVs, he has people throwing fits about how awful the CIA is. As my fellow Computerworld writer buddy Mike Elgan said, “The Wikileaks/CIA […]

Read more ...

Categories

THURSDAY, AUGUST 24, 2017

Featured

Archives

Latest Comments

Social Networks