Comcast assigned every mobile customer the same unchangeable PIN to protect against SIM hijack attacks: 0000

If someone wants to steal your phone number — say, to intercept the two-factor authentication SMSes needed to break into your bank account or other vital service — they hijack your SIM by impersonating you to your phone company (or by bribing someone at the company to reassign your phone number to them), and this has made the security of phone numbers into a top concern for security experts and telcoms companies, as there are millions of dollars at stake.

Mueller seized terabytes of data from Roger Stone

In a federal court filing making the rounds on Thursday, the office of special counsel Robert Mueller says the evidence seized from Roger Stone's residences is "voluminous and complex," and includes computer storage devices that contain "terabytes" of data representing decades of communication records from Stone's numerous mobile devices and online accounts. — Read the rest

Largest dump in history: 2.7 billion records; 773 million of them unique; 140 million never seen before

A dump called "Collection #1" has been released by parties unknown, containing email addresses and cracked passwords: in its raw form, it contains 2.7 billion records, which Troy "Have I Been Pwned" Hunt (previously) de-duplicated to come up with 773 million unique records — of those 140,000,000 email addresses and 10,000,000 passwords have never been seen in the HaveIBeenPwned database before.

Apple's new bootloader won't let you install GNU/Linux — Updated

Locking bootloaders with trusted computing is an important step towards protecting users from some of the most devastating malware attacks: by allowing the user to verify their computing environment, trusted computing can prevent compromises to operating systems and other low-level parts of their computer's operating environment.

Report: U.S. military weapon systems and computers are ridiculously easy to hack

Well this is fun: The United States Government Accountability Office released a report today that explains, in no uncertain terms, that the majority of the nation's new-fangled, high-tech weapons systems are hilariously vulnerable to cyber attacks.

From the Washington Post:

The report by the Government Accountability Office concluded that many of the weapons, or the systems that control them, could be neutralized within hours.

Read the rest

Report: someone is already selling user data from defunct Canadian retailer's auctioned-off servers

When Vancouver tech retailer NCIX went bankrupt, it stopped paying its bills, including the bills for the storage where its servers were being kept; that led to the servers being auctioned off without being wiped first, containing sensitive data — addresses, phone numbers, credit card numbers, passwords, etc — for thousands of customers. — Read the rest