Unless your firm is directly connected to the banking industry, you may not be aware of this, but the biggest ATM-related crime that banks have to grapple with is ATM Skimming. It has become a major problem, especially for ATMs that are in areas where they can be accessed 24/7, but that have low security
There’s a new attack vector to be worried about called “Windtalker.” It allows a hacker to take control of a WiFi hotspot and reverse-engineer keystrokes made by users who are typing via their touchscreens. While that sounds like magic, there are some simple principles involved, and the hackers are merely taking advantage of these. One
If recent events are any indication, Botnets are going to be in the news a lot more in coming months. Less than a month ago, a massive army of hacked internet devices broke records when it attacked a French Internet Service Provider, OVH, which hit them with traffic peaks of over 1 Terabyte per second.
There is some big news out of the FTC recently. The agency has announced that they are relaxing the rules governing what is and isn’t allowed under the Digital Millennium Copyright Act (DMCA). As of today, you can legally hack the devices you own, including cars and TVs. This is a huge policy shift that
The year of 2016 continues to break new records in terms of massive security breaches. According to LeakedSource, last month, hackers gained access to the FriendFinder Network, which includes the adult dating and swinger site, “Adult Friend Finder.” User accounts, passwords and an assortment of other sensitive information were stolen, and while the bulk of
If you own your own business, then odds are good that you’ve taken advantage of the “Sign in With Facebook” (or Google) API. It’s fast, it’s convenient and it’s one less thing to worry about. It gives your users an automatic way to sign onto your site, meaning that they don’t have yet another password
Back in the good ol’ days before the rise of the iPhone, Apple devices were largely considered to be more secure than their Wintel counterparts. There was a time when Apple used this as a major plank in their marketing efforts. These days, it is increasingly clear that that’s no longer the case. A recent
Internet Explorer is widely regarded as one of the most security riddled browsers in the history of the internet. Microsoft had hoped that with the release of Windows 10, which included a complete overhaul of IE and a rebranding of it as Microsoft Edge, the company would be able to regain its position as the
It’s amazing how pervasive WiFi has become. These days, it’s hard to imagine life without it. The internet is everywhere. It’s always on, and you’re always connected. Unfortunately, as speeds have improved and bandwidth has increased, so too have the demands we place on it, which has led to a kind of internet cold war.
So far as is known, no hacking attack to date has resulted in death, but the day is inevitably coming. One day in the not-too-distant future, a hacker will be charged with murder, in addition to their other crimes. The reason is simple, and two-fold. First, hackers have turned their attention to hospitals in a