Florida Passes Law Requiring Contact Information on Websites | Foley
On May 21, 2015, Florida Governor Rick Scott signed the True Origin of Digital Goods Act with bipartisan support in both the Florida House of Representatives and Senate. Summary and Impact on...
View ArticleSenate blocks USA PATRIOT Act reauthorization | SC Magazine
In a move championed by privacy advocates, the U.S. Senate failed to muster enough support in a 57-42 vote Friday night to temporarily reauthorize Section 215 of the USA PATRIOT Act – nor did the...
View ArticleParts of Patriot Act Expire Tonight After Senate Fails to Pass Reform | WIRED
One of the NSA’s most controversial surveillance programs ended at least temporarily Sunday, after US senators failed to pass a bill that would have reformed Section 215 of the Patriot Act, which is...
View ArticleSilk Road Mastermind Ross Ulbricht Sentenced To Life In Prison | THN
Ross Ulbricht, the alleged founder and mastermind of the infamous online black marketplace Silk Road, has been sentenced to life in prison after being found guilty of narcotics conspiracy, money...
View Article56 MEEELLION credentials exposed by apps say infosec boffins | The Register
Bad implementations of login services leave your details hanging in the wind. Researchers from the University of Darmstadt say app developers have exposed 56 million credentials by borking login...
View ArticleUS financial industry moves under a rising wave of Cyberattacks and Zero-Day...
US financial industry is under persistent attacks, the number of incidents that compromised confidentiality, integrity and availability of data are increasing. Financial industry in US maintains...
View ArticleMac bug makes rootkit injection as easy as falling asleep | The Register
Apple hacker reveals cracker 0day rootkit whacker. Respected Apple hacker Pedro Vilaça has uncovered a low-level zero day vulnerability in Mac computers that allows privileged users to more easily...
View ArticleDon’t Worry, the Government Still Has Plenty of Surveillance Power If Section...
The story being spun by the defenders of Section 215 of the Patriot Act and the Obama Administration is that if the law sunsets entirely, the government will lose critical surveillance capabilities....
View ArticleSally Beauty confirms malware on POS systems | SC Magazine
After confirming earlier this month that an illegal intrusion into its payment card systems had occurred, Texas-based international beauty supplies retailer Sally Beauty announced on Thursday that...
View ArticleSelf-Driving Cars Vulnerable to Cyberattack, Experts Warn | SecurityWeek
Hackers pose a real danger to self-driving vehicles, US experts are warning, and carmakers and insurers are starting to factor in the risk. Expected on the road by 2020 or even sooner, driverless cars...
View ArticleWhen Is a Violent Facebook Post a ‘Threat’? SCOTUS Isn’t Sure. | NJ
The Supreme Court on Monday inched a little bit closer to answering a major free-speech question: how to draw the line between real threats of violence and angry diatribes protected by the First...
View ArticleAd Blockers, Internet Advertisers Play Cat and Mouse | WSJ
Last year, executives at streaming-video provider JW Player started noticing ads its clients had paid for weren’t showing up on its platform. Founder Jeroen Wijering called Secret Media, part of a...
View ArticleControversial new law on ‘right to be forgotten’ stirs debate in Russia | RBTH
Russia has adopted a law on the so-called “right to be forgotten,” which will require internet search engines to remove links to personal information at the request of citizens. Although State Duma...
View ArticleOnline Cheating Site AshleyMadison Hacked | Krebs On Security
Large caches of data stolen from online cheating site AshleyMadison.com have been posted online by an individual or group that claims to have completely compromised the company’s user databases,...
View ArticleHacking Team and Boeing Built Cyber Weaponized Drones to Spy on Targets | THN
Over a year ago, some security researchers developed a drone called ‘Snoopy’ that was capable to intercept data from users’ Smartphones through spoofed wireless networks. Now, the email conversations...
View ArticleA handy cheat sheet for North Korea’s private “Internet” | ARS Technica
In the DPRK, they surf the Web by IP address, not DNS lookup. Aram Pan, a photographer from Singapore, has been traveling through North Korea and recording the experience with a 360-degree video camera...
View ArticleAfter Jeep Hack, Chrysler Recalls 1.4M Vehicles for Bug Fix | WIRED
WELCOME TO THE age of hackable automobiles, when two security researchers can cause a 1.4 million product recall. On Friday, Chrysler announced that it’s issuing a formal recall for 1.4 million...
View ArticleAnonymous Attacks ISIS Supporters, Spams Twitter Accounts with Anime Pics |...
The online hacktivist Anonymous has been fighting an online battle against the Islamic State (IS, previously ISIS/ISIL). And now they have just extended their fight against the organization by...
View ArticleRCSAndroid — Advanced Android Hacking Tool Leaked Online | THN
Yes, this time researchers have found a source code to a new piece of weaponized android malware that had the capability to infect millions of Android devices even when users are running latest...
View ArticleUCLA target of class-action suit after breach | SC Magazine
A class action lawsuit has been filed against UCLA Health System after a breach exposed the personal data – including social security numbers and medical information – of 4.5 million individuals. The...
View Article
More Pages to Explore .....