Bletchley Park To Become Codebreaking College

"Bletchley Park - Draco2008" by Draco2008 from UK - Bletchley Park. Licensed under CC BY 2.0 via Commons - https://commons.wikimedia.org/wiki/File:Bletchley_Park_-_Draco2008.jpg#/media/File:Bletchley_Park_-_Draco2008.jpg

Second World War codebreaking hub Bletchley Park could become a specialist codebreaking college for teams aged 16 to 19. The aim is to educate and recruit cybersecurity workers. As we’ve covered several times, the UK facility helped crack several key German encryption codes, giving Allied forces better intelligence and, by most estimates, shortening the duration […]

The Good Old Admin/Password [Comic]

committ

Back when I was a Sysadmin, I ran into this situation quite frequently at various companies I worked for. I naturally always changed the default username and password to something else, but sometimes, local users were really pissed at me for doing so. Even though I stopped being a system administrator in 2011, I’m fairly […]

UK Cabinet Members Told To Take Off Apple Watches

Britain’s Prime Minister has reportedly banned cabinet members from wearing Apple Watches during meetings. The move is said to be inspired by fears of Russian hackers. The Telegraph newspaper says Theresa May’s decision beefs up an existing policy which meant ministers had to leave their smartphones outside the room during meetings. That was driven by […]

FREE Ebook: A Comprehensive Guide to Optimizing Windows 10 (a $14.95 value) FREE for a limited time!

For today’s free ebook offer, get A Comprehensive Guide to Optimizing Windows 10 (a $14.95 value) for FREE! Windows 10 is Microsoft’s newest and most powerful Operating System but at the end of the day, it’s still software. Like any other software program, it needs to be properly configured and optimized. Learn how to optimize […]

Google To Explicitly Flag Insecure Sites

redwarning

The Chrome browser will soon start flagging sites with password or card number fields that don’t use encryption. The change in January will be the first of a multi-step process. Until now Chrome has worked like most browsers by putting the emphasis on positively identifying secure sites with the familiar padlock icon in the address […]

Apple Launches Bug Bounty Program

apple600k

Apple has announced it will pay up to $200,000 to researchers who find security bugs in its software and devices. It will initially be invite only. The news came at a rare appearance by an Apple representative, security head Ivan Krstic, at the Black Hat conference. The payouts will include maximums of: $25,000 for bugs […]

Free eBooks: The Essentials of Information Security Kit: Includes a Free PC Security Handbook – 2nd Edition eBook

security

For today’s free ebooks, we have a kit which includes 4 resources: The Essentials of Information Security brings together the latest in information, coverage of important developments, and expert commentary to help with your Information Security related decisions. -How to Transform Employee Worst Practices Into IT Security Best Practices -PC Security Handbook – 2nd Edition […]

Distorted Speech Could Trick Voice Recognition For Mobile Attacks

Used via CC licence: https://www.flickr.com/photos/topgold/12605596705

Researcher say its possible to hide garbled commands among other noise and surreptitiously trigger voice control on a phone. But it seems highly unlikely the method could be used for a genuine attack in its current form. A group of eight researchers from Georgetown University and University of California, Berkely investigated the proposition that its […]

Google Two-Factor Authentication Becomes One-Click

2factor

Google has made two-factor authentication a little simpler to use. It’s now possible to confirm your identity on a phone with a single tap rather than typing a code. At the moment, if you login to Google on an unfamiliar computer and you’re using two-factor authentication, you have to receive a six-digit code though either […]

GPS Fail Not Hacking, Lexus Says

Credit: @jrodriguez1203

The built in navigation systems in many Lexus vehicles have been hit by a “purple screen of death.” Despite some initial excitement, the problem appears to be a failed software update rather than hacking. While reports from owners are mixed, it appears the problem may affect all Lexi (to give the correct plural) from 2014 […]

Free eManual: Ransomware Hostage Rescue Manual for IT Pros

ran

For today’s free eBook, get the Ransomware Hostage Rescue Manual for IT Pros for free! Being in IT I’m sure you know someone who’s been hit with ransomware or you have been though it yourself. Wouldn’t it be great to have a manual of what to do when you get hit and how to prevent […]

10-Year-Old Claims $10,000 Instagram Bug Bounty

instagram

A 10-year-old has tipped off Facebook about a flaw that made it possible to delete any comment on Instagram. The Finnish boy has earned a $10,000 bounty despite not officially being old enough to have an Instagram account. While Facebook hasn’t revealed the full details of the  flaw, it has said it was in a […]