FBI-Apple Battle Takes Surprise Twist

iphonedestroy

The FBI says it may be able to unlock the San Bernadino shooter’s iPhone without Apple’s help. It’s delayed a court case and could make for some awkward outcomes either way. In case you’ve missed it, there’s a great explanation of the technological issues behind the case at the Franklin Veaux blog. The short and […]

Ear Canal Could Be Next Biometric Key

neccanal

Forget the fingerprint: NEC believes the ear canal could be the secret to biometric identification. It says the system could improve security on confidential phone calls. The company isn’t the first to turn to the ear as a way of confirming identity. Last year Yahoo tested the idea of using phone touchscreens to capture an […]

Free eBook: Implementing SSL/TLS Using Cryptography and PKI (Valued at $39.99)

ssltls

Here’s our free eBook for today: Implementing SSL/TLS Using Cryptography and PKI (Valued at $39.99.) A hands-on, practical guide to implementing SSL and TLS protocols for Internet security! Coverage includes: Understanding Internet Security Protecting against Eavesdroppers with Symmetric Cryptography Secure Key Exchange over an Insecure Medium with Public Key Cryptography Authenticating Communications Using Digital Signatures […]

Free Ebooks: The 2016 Security Essentials – The Ultimate Defense Kit (a $39.99 value!)

winsec

For today’s free ebook, get The 2016 Security Essentials – The Ultimate Defense Kit ,a $39.99 value, for free! Kit includes “Windows Malware Analysis Essentials” plus 3 other resources to help you understand network security. By delving into end to end analysis with real-world malware samples to solidify your understanding, you’ll sharpen your technique of […]

DoD Invites You To Hack The Pentagon

pentagon

The Department of Defense has challenged computer experts to hack the Pentagon. However, you’ll have to register first or face serious consequences. The idea is to run a more crowdsourced versions of programs where businesses and government agencies ask “white hat” hackers to test their cyberdefenses. Whereas those often involve a flat fee, the DoD […]

Free eBooks: The Essentials of Information Security Kit: Includes a Free PC Security Handbook – 2nd Edition eBook

security

For today’s free ebooks, we have a kit which includes 4 resources: The PC Security Handbook (2nd Edition), 6 Steps to an Effective Performance Monitoring Strategy, Online Penetration Testing and Ethical Hacking (FREE Video Training Course,) and The Three Critical Steps to Achieve Zero Downtime. The following kit contents will help you get the most […]

Google’s Expands Anti-DDos Tool For News Sites

projectshield

Google is offering to protect news sites large and small from DDos attacks. It’s extending Project Shield, which was originally only for selected websites. The free service launched a few years ago for around 100 sites which had limited tech resources but were at particular risk of such attacks, including those highlighting human rights and […]

Free eBook: The Ultimate Guide to Creating, Managing and Securing Your Passwords (a $5 value)

ulti1

Here’s a quick deal for you geeks. This deal will only be good for a limited time: The Ultimate Guide to Creating, Managing and Securing Your Passwords, a value of $5, is now free for a limited time! Find practical solutions for your everyday security needs. Password hacks are becoming increasingly common and making sure […]

Mobile Industry Bigwigs Fooled By Bogus Starbucks Wi-Fi

Wifi_logo

You’d think delegates at Mobile World Congress would be security conscious with their phones. However, one security firm says it found more than 2,000 users who fell for a pretty basic trick. Avast researchers went to Barcelona, host city for the event, and set up three Wi-Fi networks in the airport at a peak time […]

Apple Defies Court Order On Encrypted iPhone

By Kindly granted by Valery Marchive (LeMagIT) - Flickr, CC BY-SA 2.0, https://commons.wikimedia.org/w/index.php?curid=16228490

Apple has vowed to defy a court order to give the FBI access to files on a phone owned by one of the San Bernadino shooters. Tim Cook says that the move would threaten the security of all customers. The order involves the phone of Syed Rizwan Farook, which the FBI believes could house information […]

Federal Law Would Ban Mandatory Smartphone Backdoors

congressseal

Attempts by two states to weaken the encryption available on smartphones could be blocked by a federal law. The measure would stop laws which could mean a major redesign of many high-profile handsets As we’ve previously covered, state legislators in New York and California are both considering suspiciously similarly worded bills on the matter. Both […]

Malware Museum Celebrates Destructive Sprites

ha

80s and 90s computer nostalgia is usually about floppy disks and waggling joysticks, but one virtual “museum” is celebrating a less savory aspect of the era: early MS-DOS malware. The collection is part of the Internet Archive, which aims to preserve web pages and other computer media for posterity. Archivist Jason Scott has selected 79 […]