Free eBooks: The Essentials of Information Security Kit: Includes a Free PC Security Handbook – 2nd Edition eBook

security

For today’s free ebooks, we have a kit which includes 4 resources: The Essentials of Information Security brings together the latest in information, coverage of important developments, and expert commentary to help with your Information Security related decisions. -How to Transform Employee Worst Practices Into IT Security Best Practices -PC Security Handbook – 2nd Edition […]

Distorted Speech Could Trick Voice Recognition For Mobile Attacks

Used via CC licence: https://www.flickr.com/photos/topgold/12605596705

Researcher say its possible to hide garbled commands among other noise and surreptitiously trigger voice control on a phone. But it seems highly unlikely the method could be used for a genuine attack in its current form. A group of eight researchers from Georgetown University and University of California, Berkely investigated the proposition that its […]

Google Two-Factor Authentication Becomes One-Click

2factor

Google has made two-factor authentication a little simpler to use. It’s now possible to confirm your identity on a phone with a single tap rather than typing a code. At the moment, if you login to Google on an unfamiliar computer and you’re using two-factor authentication, you have to receive a six-digit code though either […]

GPS Fail Not Hacking, Lexus Says

Credit: @jrodriguez1203

The built in navigation systems in many Lexus vehicles have been hit by a “purple screen of death.” Despite some initial excitement, the problem appears to be a failed software update rather than hacking. While reports from owners are mixed, it appears the problem may affect all Lexi (to give the correct plural) from 2014 […]

Free eManual: Ransomware Hostage Rescue Manual for IT Pros

ran

For today’s free eBook, get the Ransomware Hostage Rescue Manual for IT Pros for free! Being in IT I’m sure you know someone who’s been hit with ransomware or you have been though it yourself. Wouldn’t it be great to have a manual of what to do when you get hit and how to prevent […]

10-Year-Old Claims $10,000 Instagram Bug Bounty

instagram

A 10-year-old has tipped off Facebook about a flaw that made it possible to delete any comment on Instagram. The Finnish boy has earned a $10,000 bounty despite not officially being old enough to have an Instagram account. While Facebook hasn’t revealed the full details of the  flaw, it has said it was in a […]

FBI Could Hack Nationwide

supremecourt

US courts may soon have the power to authorize remote ‘hacking’ searches of computers across the country and even abroad. The Supreme Court has approved a change to rules about the scope of such searches. Unlike most Supreme Court rulings, this isn’t on a specific (precedent-setting) case. Instead the court was required to approve a […]

FREE eBook: Mobile Security: How to Secure, Privatize, and Recover Your Devices (a $26.99 value)

mobile

For today’s free eBook, we offer you “Mobile Security: How to Secure, Privatize, and Recover Your Devices” (a $26.99 value) for free! In this guide you will discover just how vulnerable unsecured devices can be, and explore effective methods of mobile device management and identity protection to ensure your data’s security. There will be special […]

Bank’s $10 Switches Allow $80m Heist

bangbank

Bangladesh’s central bank saved several hundred dollars by using cheap second-hand network switches. Unfortunately that move has now cost it $80 million. The bank was hit in February by hackers who actually tried to instigate just under a billion dollars worth of bogus payments. The sheer number of payments, along with a spelling error in […]

Google.com Dangerous Says Google (But Not Anymore!)

googlelogo

Google briefly labelled Google.com as “partly dangerous.” The automated warning appears to be a quirk caused by hosted content. The warning came on Google’s own Transparency Report page, which includes details of its Safe Browsing technology. That’s the database that gives warnings in Google’s search tools and the Chrome browser when pointing to a potentially risky […]

USB-C Could Get Safer

usbc

A new authentication program could warn you if a USB-C cable risks frying your laptop. It could also develop into a security measure. The performance of USB-C cables appears to be somewhat mixed, largely because many sold under that name fall short of the actual specification. That inspired dozens of harsh but detailed reviews from […]

Free Video Training Course: Kali Linux 101 (A $19 Value!)

For today’s deal, follow the “Kali Linux 101” video course, a $19 value, for free! Please note that Kali Linux is an advanced penetration testing Linux distribution. As indicated by the ‘101′ in the course title, this course is a beginner’s guide to getting started in Kali…to get your feet wet. The course is broken […]