The Good Old Admin/Password [Comic]


Back when I was a Sysadmin, I ran into this situation quite frequently at various companies I worked for. I naturally always changed the default username and password to something else, but sometimes, local users were really pissed at me for doing so. Even though I stopped being a system administrator in 2011, I’m fairly […]

UK Cabinet Members Told To Take Off Apple Watches

Britain’s Prime Minister has reportedly banned cabinet members from wearing Apple Watches during meetings. The move is said to be inspired by fears of Russian hackers. The Telegraph newspaper says Theresa May’s decision beefs up an existing policy which meant ministers had to leave their smartphones outside the room during meetings. That was driven by […]

FREE Ebook: A Comprehensive Guide to Optimizing Windows 10 (a $14.95 value) FREE for a limited time!

For today’s free ebook offer, get A Comprehensive Guide to Optimizing Windows 10 (a $14.95 value) for FREE! Windows 10 is Microsoft’s newest and most powerful Operating System but at the end of the day, it’s still software. Like any other software program, it needs to be properly configured and optimized. Learn how to optimize […]

Google To Explicitly Flag Insecure Sites


The Chrome browser will soon start flagging sites with password or card number fields that don’t use encryption. The change in January will be the first of a multi-step process. Until now Chrome has worked like most browsers by putting the emphasis on positively identifying secure sites with the familiar padlock icon in the address […]

Apple Launches Bug Bounty Program


Apple has announced it will pay up to $200,000 to researchers who find security bugs in its software and devices. It will initially be invite only. The news came at a rare appearance by an Apple representative, security head Ivan Krstic, at the Black Hat conference. The payouts will include maximums of: $25,000 for bugs […]

Free eBooks: The Essentials of Information Security Kit: Includes a Free PC Security Handbook – 2nd Edition eBook


For today’s free ebooks, we have a kit which includes 4 resources: The Essentials of Information Security brings together the latest in information, coverage of important developments, and expert commentary to help with your Information Security related decisions. -How to Transform Employee Worst Practices Into IT Security Best Practices -PC Security Handbook – 2nd Edition […]

Distorted Speech Could Trick Voice Recognition For Mobile Attacks

Used via CC licence:

Researcher say its possible to hide garbled commands among other noise and surreptitiously trigger voice control on a phone. But it seems highly unlikely the method could be used for a genuine attack in its current form. A group of eight researchers from Georgetown University and University of California, Berkely investigated the proposition that its […]

Google Two-Factor Authentication Becomes One-Click


Google has made two-factor authentication a little simpler to use. It’s now possible to confirm your identity on a phone with a single tap rather than typing a code. At the moment, if you login to Google on an unfamiliar computer and you’re using two-factor authentication, you have to receive a six-digit code though either […]

GPS Fail Not Hacking, Lexus Says

Credit: @jrodriguez1203

The built in navigation systems in many Lexus vehicles have been hit by a “purple screen of death.” Despite some initial excitement, the problem appears to be a failed software update rather than hacking. While reports from owners are mixed, it appears the problem may affect all Lexi (to give the correct plural) from 2014 […]

Free eManual: Ransomware Hostage Rescue Manual for IT Pros


For today’s free eBook, get the Ransomware Hostage Rescue Manual for IT Pros for free! Being in IT I’m sure you know someone who’s been hit with ransomware or you have been though it yourself. Wouldn’t it be great to have a manual of what to do when you get hit and how to prevent […]

10-Year-Old Claims $10,000 Instagram Bug Bounty


A 10-year-old has tipped off Facebook about a flaw that made it possible to delete any comment on Instagram. The Finnish boy has earned a $10,000 bounty despite not officially being old enough to have an Instagram account. While Facebook hasn’t revealed the full details of the  flaw, it has said it was in a […]

FBI Could Hack Nationwide


US courts may soon have the power to authorize remote ‘hacking’ searches of computers across the country and even abroad. The Supreme Court has approved a change to rules about the scope of such searches. Unlike most Supreme Court rulings, this isn’t on a specific (precedent-setting) case. Instead the court was required to approve a […]