Cyber Security News

Hacking Self Driving Cars
Date

Hacking Self Driving Cars

Recently the American government issued guidelines for driverless vehicles. This creates national standards so that car manufacturers do not have to figure out how to follow 50 different laws in 50 different states. Analysts have said these rules seek to make this market grow without imposing a heav

The Myth of Password Complexity
Date

The Myth of Password Complexity

The newspapers have finally reported what thinking people have already figured out for themselves. What we have been told for decades about setting password policies is based on illogical thinking. The Fallacy of the Complicated PasswordIf you have set up Active Directory, LDAP, or any application

Cryptography and Ransomware
Date

Cryptography and Ransomware

Ransomware is based on the idea that the victim cannot decrypt their encrypted files with a key because it would be impossible to guess the value of the key. The hacker who has encrypted a file like this will sell the victim this key. So you could say that they have held their file hostage and are

Hackers Steal Facebook User Access Tokens from Epic Games
Date

Hackers Steal Facebook User Access Tokens from Epic Games

Hackers this week stole 800,000 user tokens from Epic Games. Much of that was Facebook data.   When you go to a website that lets you login with your Google or Facebook credentials, that site exchanges data with Google or Facebook. Those social media sites issues some kind of token, which you

Hackers Steal NSA Exploit Kit and Put it up for Auction
Date

Hackers Steal NSA Exploit Kit and Put it up for Auction

In what is a truly embarrassing event for America’s signal intelligence service, hackers got their hands on a massive set of hacking tools belonging to of the NSA. The hacking group, called the Shadow Brokers, put part of this online for free to show that it was genuine. Now they are selling the res

ChromeOS Security Overview
Date

ChromeOS Security Overview

If computers get hacked because of weaknesses in the operating system then why not remove the operating system to make them more secure? That’s the simple principle behind ChromeOS, the open source operating system sponsored by Google. There is only one program on ChromeOS: that is the Chrome brow

Cell Phone Security and Encryption
Date

Cell Phone Security and Encryption

There have been some high profile incidents of cell phone hacking some years ago. For example, the former Speaker of the House of Congress in the USA Newt Gingrich was hacked when an older married couple used a simple radio scanner to listen in on his calls.  But you do not hear about such hack

Russians Hack the American Presidential Campaign
Date

Russians Hack the American Presidential Campaign

The US has levelled the charge that the Russian government has hacked into the headquarters of the Democrat Party in the USA. They say the Russian goal was to steal political campaign data and give it to presidential candidate Donald Trump to help him against Hillary Clinton. The assertion is that