Uncategorized

New website aims to publicly shame apps with lax security

Appropriately named HTTP Shaming IDs apps and Web services operating without encryption. by Robert Lemos HTTP Shaming’s ethos is even on a fridge. Tony Webster, HTTP Shaming The amount of personal data traveling to and from the Internet has exploded, yet many applications and services continue to put user information at risk by not encrypting data

New website aims to publicly shame apps with lax security Read More »

Why would Chinese hackers want US hospital patient data?

Medical records data can be a valuable asset, especially in a country where many have no health insurance By Martyn Williams IDG News Service – The theft of personal data on 4.5 million patients of Community Health Systems by hackers in China highlights the increasing degree to which hospitals are becoming lucrative targets for information theft. Already this

Why would Chinese hackers want US hospital patient data? Read More »

Attacks exploited YouTube & Microsoft Live to install surveillance

Credit: © Ocean/Corbis When a cybercrook targets a person, he or she usually relies on tricking the victim into clicking on link bait – such as exploiting the death of Robin Williams – or opening an email attachment, spear phishing so the victim enters sensitive info on a spoofed site, or watering hole attacks that

Attacks exploited YouTube & Microsoft Live to install surveillance Read More »

Tesla swings by DEF CON in search of car hackers to secure the Model S

By Ryan Whitwam The traditional auto industry has been slow to adopt new technology, butTesla is far from traditional. The electric car start up helmed by Elon Musk (also the founder of SpaceX) relies on advanced computer control of the car’s systems, and of course it has that gigantic 17-inch touchscreen center console in the Model S.

Tesla swings by DEF CON in search of car hackers to secure the Model S Read More »

PrimalSec’s Python Tutorial Series

Primal Security unleashes a 12-part Python tutorial series. From “Hello World” to Python malware/exploits, take my hand and walk into the darkness – Happy Hacking!http://www.primalsecurity.net/python-tutorials/ This tutorial series is designed for those who don’t come from a programming background.  Each tutorial will cover common use cases for Python scripting geared for InfoSec professionals.  From “Hello

PrimalSec’s Python Tutorial Series Read More »