Tuesday, March 18, 2014

Sunday, June 9, 2013

Iran ups cyber attacks on Israeli computers: Netanyahu - Yahoo! News

Iran ups cyber attacks on Israeli computers: Netanyahu - Yahoo! News:
2013 will be known as the year where Cyber security became an "aware issue" for most citizens worldwide.  This is disruptive warfare and changes the rules of the game of power.
'via Blog this'

Sunday, June 2, 2013

Researchers Say They Can Hack Your iPhone With A Malicious Charger - Forbes

Researchers Say They Can Hack Your iPhone With A Malicious Charger - Forbes:
Innocent-looking, malicious USB chargers can be constructed that will infect your iPhone - it's just a matter of time -Cybercrime is just getting started.... http://ebomb.us
'via Blog this'

Wednesday, March 20, 2013

A DIY UAV That Hacks Wi-Fi Networks, Cracks Passwords, and Poses as a Cell Phone Tower | Popular Science

A DIY UAV That Hacks Wi-Fi Networks, Cracks Passwords, and Poses as a Cell Phone Tower | Popular Science:
 they’ll be showing off a functioning homemade spy drone that can sniff out Wi-Fi networks, autonomously crack passwords, and even eavesdrop on your cell phone calls by posing as a cell tower... the duo has taught their WASP a new way to surreptitiously gather intel from the ground: pose as a GSM cell phone tower to trick phones into connecting through WASP rather than their carriers... Tassey and Perkins say they built WASP so show just how easy it is, and just how vulnerable you are. “We wanted to bring to light how far the consumer industry has progressed, to the point where public has access to technologies that put companies, and even governments at risk from this new threat vector that they’re not aware of,” Perkins told Forbes.
'via Blog this'

Tuesday, March 19, 2013

Hacked PCs falsify billions of ad clicks - FT.com

Hacked PCs falsify billions of ad clicks - FT.com:
Even the wild west analogy barely steps up to the scale and potential financial and economic impact of intrusions on and attacks into the new internet infrastructure where rules and laws are made in real-time by gangsters, warriors, terrorists, entrepreneurs, and state actors, to exploit and capitalize and profit from gaming the system.  Attacks in the future will not be conventional bombs, and suicide vests, but rater processes perturbing  transactions resulting in  chaos in financial systens as confidence evaporates.

Beware eBomb.us
'via Blog this'

Friday, June 15, 2012

Google Voice: a step-by-step primer on ditching your land line while keeping your number | ZDNet

Google Voice: a step-by-step primer on ditching your land line while keeping your number | ZDNet:

$45 and you can port your landline number to Google Voice - but you'll have to port it to a cell phone number as part if the process.
http://www.zdnet.com/blog/government/google-voice-a-step-by-step-primer-on-ditching-your-land-line-while-keeping-your-number/10455?tag=content;siu-container

'via Blog this'