I decided to enter my first USA Memory Championship only a few months after I'd first learned it existed. This was two years before it entered the wider public consciousness after its portrayal in Joshua Foer's bestselling book Moonwalking with Einstein. — Read the rest
Nuuo is a leading vendor of "trusted video management" tools used in conjunction with CCTVs deployed in sensitive applications like surveillance of "transport, banking, government, and residential areas."
Law firms are singularly bad at technology, yet present a singularly delicious target to hackers. One particular vulnerability comes from all their abandoned domain names, which Gabor Szathmari writes "pose a significant cyber risk to the legal profession."
Domain name abandonment allows cybercriminals to gain access to, or reset passwords for online services and profession-specific portals.
I'm now the proud owner of a Microsoft Surface Go with 8GB of RAM and a 128GB SSD. It's by no means a power house (I'll have a review for you sometime next week that addresses my user experience,) but it's more than capable of allowing me to get work done in coffee shops, on an airplane tray table or in the bathroom. — Read the rest
As you might imagine, Spyfone is a company that offers to spy on other peoples' phones for you: its major market is parents and bosses who infect and surveil the phones their kids/minions use, peeking on their texts, emails, Facebook messages, passwords, photos, browsing history, etc.
The Democratic National Committee called the FBI Tuesday, after discovering what the DNC says was the early phase of a sophisticated phishing attempt to hack its voter database.
When you die, your relatives will be sad and (depending on the circumstances of your death) possibly left scrambling to make arrangements for your remains, effects, and estate.
Facebook's longtime Chief Security Officer Alex Stamos is quitting, as announced earlier this year. The company seems to think it doesn't need a new CSO, despite having just acknowledged Tuesday it is the subject of ongoing, sustained, coordinated information warfare attacks just ahead of the 2018 midterm elections.
A new twist on an old email scam making the rounds addresses its recipients by name and uses an actual password (hopefully deprecated). They attempt to blackmail victims, and it's definitely a little anxiety-inducing to see an old password written out.
Our technology-centric society is making people miserable, says Don Norman, cognitive scientist and author of the classic book on human-centric design, The Design of Everyday Things. The technology we use expects us to behave like machines, he says, and when we fail, we get all the blame. — Read the rest
The porn extortion scam works like this: you get an email from a stranger claiming that he hacked your computer and recorded video of you masturbating to pornography, which he'll release unless you send him some cryptocurrency.
CBC reporters have verified health record files provided by hackers who say they acquired them by breaking into the computers of CarePartners, a company that contracts with the Ontario government.
When wifi first appeared, it was secured by something called "WEP" that was so laughably weak that many people believe it was deliberately sabotaged by US spy agencies (who have a history of sabotaging security standards in order to preserve the ability to spy on their adversaries).
People who help domestic abuse survivors say that they are facing an epidemic of women whose abusers are torturing them by breaking into their home smart devices, gaslighting them by changing their thermostat settings, locking them out of their homes, spying on them through their cameras. — Read the rest
Shenzhen Gwelltimes Technology Co., Ltd is the white-label vendor behind a whole constellation of Internet of Things networked home cameras sold as security cameras, baby monitors, pet monitors, and similar technologies; these cameras are designed to be monitored by their owners using an app, and because of farcically bad default passwords ("123") and other foolish security practices (such as sequentially numbering each camera, allowing attackers to enumerate vulnerable devices), the devices are trivial to locate and hijack over the internet.
Eric Abramovitz is a gifted musician, who can currently be found fulfilling the role of associate principal/E flat clarinetist at the Toronto Symphony: a position that thousands of musicians around the world would kill for. Back in 2014, he applied for another position that these same musicians would think kill-worthy, too: a placement with the Colburn Conservatory as a student. — Read the rest
A security breach affected the MyHeritage website, and leaked the personal information of over 92 million users, the Israeli company said Tuesday. — Read the rest
The UK consumer review magazine Which? (equivalent to America's Consumer Reports) has published a special investigation into the ways that Internet of Things smart devices are spying on Britons at farcical levels, with the recommendation that people avoid smart devices where possible, to feed false data to smart devices you do own, and to turn off data-collection settings in devices' confusing, deeply hidden control panels.
The FBI sent out an urgent bulletin advising anyone with a home or small office internet router to immediately turn it off and then turn it on again as a way to help stop the spread of a malware outbreak with origins in Russia. — Read the rest