Ur car cd b stolen by txt

A security consultant has shown it’s possible to steal some cars simply by sending a specially crafted series of text messages. Don Bailey of iSEC Partners was speaking at the Black Hat security conference in Las Vegas. It’s an annual event designed to inform security professionals about the latest threats, and has become known for […]



Hacker convention adds junior event

Kids are being invited to Las Vegas to learn hacking skills. Nope, this isn’t another story from the creative mind of Stephen Glass, but a genuine event. The annual DEF CON hacker convention will for the first time feature a special children’s event this weekend at the Rio hotel, known as DefCon Kids. The event […]

Google Cracks Down on Pseudonyms, Kills One Reason It Was Better than Facebook

You may have heard that Google+ started culling accounts – businesses first, which didn’t seem like such an awful thing since they’re promising special support for business accounts in the future.  But now the crackdown has extended to pseudonyms as well – that’s right, now you have to use your real name on both Plus […]



Laptop Encryption: Can You Plead the Fifth?

A Colorado court case could set a precedent on whether the right to remain silent extends to encrypted files. The Justice Department wants a federal judge to rule that defendant Ramon Fricosu must decrypt a laptop that prosecutors believe has evidence showing her guilt in an alleged mortgage scam. Fricosu’s lawyers say doing so could […]

What to Do When the Police Want to Search Your Digital Devices

Here’s a quick guide from the EFF on what to do when the police comes knocking asking to search your digital devices. [EFF]

Some Reasons to Be Optimistic About Google Plus

Here’s a dirty little secret: I thought Google Wave was going to be awesome. I admit this so that you can immediately discount everything I’m about to write if you like, but wait, hear me out! If you haven’t been living under a rock for the past 48 hours or so then you’ve heard about […]

Internet IDs: Yea or Nay?

Internet IDs are a hot topic recently, particularly in light of LulzSec’s aggressive (but abbreviated) campaign against , like, everyone ever. Proponents argue that a system of “trusted credentials”–as they’re ambiguously called now because the technology is still mostly in development–would allow for safer, more secure online transactions. The opposition says that these efforts are […]

Stuxnet: Anatomy of a Computer Virus [Video]

Check out this awesome animated infographic dissecting the nature and ramifications of Stuxnet, the first weapon made entirely out of code. This video was produced for HungryBeast, an Australian TV program that airs on Australia’s ABC1 [Vimeo]

Virtual Warfare to Get Physical Response

A cyberattack on the United States could result in a physical military retaliation under a revised Pentagon strategy. The move probably won’t mean modern-day David Lightmans should expect to see tanks outside their doors, but it could mean some decisive responses: in the words of an unnamed official speaking to the Wall Street Journal, “If […]

Lulz(Sec), PBS. Problems??

An article claiming “Tupac still alive in New Zealand” appeared on PBS.org late last night, and for most readers was probably the first indication that strange things were afoot in the site’s security sector. Hacker group LulzSec (or “The Lulz Boat”) commandeered PBS’s website in retaliation for their recent Frontline broadcast, “Wikisecrets,” which criticized Wikileaks, Julian Assange […]