If you are in charge of enforcing web surfing policies for your enterprise and you are not already blocking mega-popular social networking sites like MySpace for your users, here is yet another reason to do so: Fake Microsoft updates that deliver a machine-killing Kevorkian cocktail. Your user thinks he’s adding a new friend and helpfully […]
Maybe you thought we were being paranoid about security in our post last Thursday about Boeing’s unholy union of user Internet access with networks for control and navigation aboard the new 787 Dreamliner. Nobody could really hack one of these networks, now could they? As if presaging things to come, a teenager in ?ód?, Poland managed to […]
Boeing’s new 787 Dreamliner, due to enter service in November 2008, packs a load of innovations in an attempt to fend off competition from its rival, Airbus. Touting exceptional fuel efficiency as its main draw for buyers, the 787 also includes numerous new features to improve passenger experience: larger seats, windows, and luggage bins; better […]
By PatB Contributing Writer, [GAS] When it comes to incident response, there is a right way and a wrong way to handle what appears to be a targeted attack against your public infrastructure. The right way is to follow your response plan. The Wrong Way is to pull the ethernet jack from your Firewall and […]
In the following segment of the The Real Hustle, The hustlers explain how villains can exploit a flaw within Bluetooth-enabled cell phones to steal some of your hard-won money. Want to know if your phone is vulnerable? Then just try to bluesnarf yourself!
By PatB Contributing Writer, [GAS] I have never downloaded an MP3 song from a recording artist off of the Internet. I think this makes me somewhat of a rarity in the cyber world. I never did it, not because of some sense of morality, or stance on copyright issues. I saw first hand the dangers […]
By Shea Gunther Contributing Writer, [GAS] In the world of top secret spy tech, there’s sneaky cool and then there is sneeeaky cool. This next item is set firmly in the second camp. The US Air Force Research Lab (AFRL) is working on a tiny spy plane that has the ability to land on a […]
By Rob Dunn Contributing Writer, [GAS] Aside from malware/spyware and viruses, the biggest trouble with most home computers can probably be attributed to the build-up of user data over time. You’ve seen it happen over and over again: digital pictures, videos, documents, spreadsheets, and more fill up the drive and eventually adversely affect the performance […]