To paraphrase an old expression: Give a man an apple and you feed him for a day; teach a man to phish apple IDs and you feed him for a lifetime -- with stolen data. That's what some bold phishers are hoping for, according to a new report by security intelligence company Trend Micro, which documents a major phishing scam that has already compromised 110 sites in a plan to steal Apple IDs.
We've all heard of a distributed denial of service (DDoS) attack and know what it is: when a person or people attempt to take down a Web site by flooding it with connection requests. These max out the site's bandwidth, making it unable to accept new requests. The attacks are usually automated and can be accomplished in a variety of ways. The loss of traffic during the attack itself, and the recovery afterward, can end up costing Web sites quite a lot.
But what does that actually look like? Well, nothing by itself; but thanks to a Web site traffic visualization tool called Logstalgia, Ludovic Fauvet, developer of the Web site VideoLAN (which created and distributes the free multimedia player VLC), managed to capture an April 23 DDoS attack on his site. … Read more
The White House has NOT been bombed, folks, despite what you might have seen on the Associated Press Twitter account.
Hackers apparently got ahold of the wire service's Twitter feed and tweeted out "breaking" news of a White House bombing that injured President Barack Obama.
Not so, say the Twitter feeds of AP corporate and some employees.
When the tweet went out, Twitter immediately erupted with notes from sleuthing tweeps who noted that the suspicious tweet did not use the normal all caps style for BREAKING news, and was sent from the Web, which is unusual for … Read more
Authorities pursuing a suspect in the Boston Marathon bombing have a love-hate relationship with social media. After initially asking for help via Twitter, law enforcement later requested that social-media users be a little more conscientious about the kind of information shared (or fabricated) on social networks.
In the immediate aftermath of the dual blasts that killed three and injured dozens near the marathon finish line on Monday, law enforcement turned to the public via Twitter and other platforms for help crowdsourcing leads. On Thursday, the FBI released video footage of two young men carrying backpacks near the finish line of … Read more
Microsoft started rolling out its two-step verification process on April 17. Also known as two-factor authentication or two-step authentication, the process strengthens your account security by requiring you to enter your password (step 1), then a security code (step 2). The security code can be sent to you by e-mail, SMS, or phone call, or you can use an authenticator app on your mobile device.
Enabling two-step verification on your Microsoft account will enable it across all Microsoft services that currently support two-step verification, like Windows, Outlook.com, Office, and SkyDrive. If you're interested in trying it out, here'… Read more
It's a sad occasion when a laptop is stolen. All that money, time, and personal data just disappear into the night. This is the Tumblr story of a boy and his stolen laptop. Dom Deltorto lives in London. In early February, he says, someone broke into his flat and made off with his MacBook Pro and his iPad.
Deltorto was prepared for just such an incident. He had installed Hidden App on his laptop, a program that tracks the laptop's location and sends back images of the thief. However, Hidden App still needs to be connected to the Internet to work. After more than a month of radio silence, Deltorto reports that his MacBook suddenly came online, but it wasn't in a place where he could just call the London police and have them recover it.… Read more
How bad is the smartphone-theft epidemic? San Francisco District Attorney George Gascon accuses phone companies of profiting from stolen phones, as Michael Scherer reported last month on Time's Swampland site. Gascon is one of several leading law-enforcement officials calling for carriers to be required to implement technology that permanently deactivates stolen phones. It is simply too easy for thieves to resell smartphones.
One year ago, the major cellphone services announced via the CTIA Wireless Association plans to create a database "designed to prevent GSM smartphones reported as stolen from being activated or provided service." The database was … Read more
In one of the first independent tests of third-party security suites on Windows 8, nearly all antivirus and anti-malware software tested well. What may surprise you is that even without a third-party suite, Windows 8 is relatively resistant to modern threats like zero-day attacks, according to the report.
Independent German security suite evaluators AV-Test.org publish bimonthly tests that rate the effectiveness of the biggest Windows security suites out there and rated all 26 of the suites they tested on Windows 8 in January and February as "certified," including Windows 8 itself. This is because Windows 8 comes … Read more
In the OS X Security system preferences you can set the system to require a password when the system wakes from sleep or after the screensaver has been active for a period of time. However, you may run into a few cases in which entering your account password then does not work.
One cause can be if you have recently changed the name of your user account. For authentication, OS X will use either the short or long username, along with any aliases that you have associated with your account. However, if you have changed the long username for your … Read more
Violence against women in India has come under the worldwide spotlight following the emergence of high-profile cases such as the gang-rape of a young woman in December. She later died from her injuries. In an effort to stem the violence, the Indian government is working on developing a wristwatch that would send out alerts for help. Three Indian engineering students also have joined the cause, creating an anti-rape undergarment that could provide a layer of protection for women.
Manisha Mohan, Niladri Basu Bal, and Rimpi Tripathi attend SRM University in Chennai. Their project is called SHE (Society Harnessing Equipment). The device is like a slip, to be worn under clothes. It has sensors and an electric shock circuit board built into it. The circuit is attached near the bosom and is designed to deliver an electric shock when an assailant comes into contact with it.… Read more