Permalink

Man discovers he has been impersonated on Amazon by a money-launderer selling $555 "books" full of computer-generated word salad

Amazon reported to the IRS that Patrick Reames had made $24,000 selling books on its Createspace self-publishing platform, but Patrick Reames never got a dime of that money; it appears that a money-launderer who had Reames’s Social Security Number used … Continue reading

Permalink

Rancher takes feds to court over camera they placed on his property without permission

Ricardo Palacios, a 74-year old rancher, had gotten used to Customs and Border Protection officials tromping across his south Texas ranch lands without permission over the years. But finding a wireless surveillance camera set up in one of his trees? … Continue reading

Permalink

In 2009 a NJ judge banned hooking up voting machines to the internet, but that's exactly how ES&S's "airgapped" machines work

Connecting voting machines to the internet is a terrible idea: the machines are already notoriously insecure, and once they’re online, anyone, anywhere in the world becomes a potential attacker. (more…)

Permalink

XKCD's security meltdowns for the coming year

Over at XKCD, Randall Munroe’s predicted the Critical Vulnerabilities and Exposures for 2018, with some pretty solid predictions (especially under the tooltip, which finally reveals a secret that many of us have kept mum about for literal decades — damn … Continue reading

Permalink

Once again, a stalkerware company's had its servers pwned and wiped by a hacker who thinks they're selling an immoral product

It’s been less than a year since a public-spirited hacker broke into the servers of Florida stalkerware vendor Retina-X, wiping out all the photos and data the company’s customers had stolen from other peoples’ phones (including their kids’ phones) by … Continue reading

Permalink

Reporting Line of the CISO: Why Reporting to the CIO is Increasingly a Problem in Large Firms

In several articles last year, we have explored how to organise InfoSec for success and how to best establish the reporting line of the CISO. Our view – built on years of direct field experience – is that the reporting … Continue reading

Permalink

IBM Security survey finds users value "security" over "convenience"

IBM Security’s 2018 survey of 4,000 adults worldwide found that for the first time in the history of their research, the majority of users say that they’d take extra steps in the name of “security” even if it meant that … Continue reading

Permalink

Cryptojacking malware discovered running on critical infrastructure control systems

Radiflow reports that they discovered cryptojacking software — malware that mines cryptocurrency — running in the monitoring and control network of an unnamed European water utility, the first such discovery, and a point of serious concern about the security and … Continue reading

Permalink

Dissidents are getting destroyed by information attacks and tech isn't doing enough to help

A pair of researchers from Toronto’s storied Citizen Lab (previously) have written an eye-opening editorial and call to action on the ways that repressive states have used the internet to attack dissidents, human rights advocates and political oppositions — and … Continue reading