Cyber Security News

JP Morgan Hackers Plead Guilty
Date

JP Morgan Hackers Plead Guilty

Lots of people who follow cybersecurity news know that hackers stole data on 83 million customers at JP Morgan in 2014. But in a development that does not happen enough, now the hackers have been caught. Lots of criminal hackers operate from places like Russian and Romanian where they are pretty mu

Hackers find Metaphor Android Exploit
Date

Hackers find Metaphor Android Exploit

There is a new exploit that has been found to attack the previously known security weakness in the Android Stagefright multimedia library. The exploit lets a hacker take over an Android device. Here we explain how it works, what versions of Android it affects, and when you can expect it to be fixed

Screen Locking Tech Support Scams
Date

Screen Locking Tech Support Scams

It’s too bad most people don’t use Ubuntu. While your mom would not understand it, maybe your sister would. Because Windows has too many security vulnerabilities. It also has more viruses, because it has more users, so it is a bigger target. Yet the weakest part of any system, Windows or not, remain

Edward Snowden, Julian Assange, and Laura Poitras
Date

Edward Snowden, Julian Assange, and Laura Poitras

Oscar winning documentary filmmaker Laura Poitras has a new film. It’s about Julian Assange, the WikiLeaks founder. She was at the Cannes Film Festival previewing it this week.    In case you do not know who Laura Poitras is, she is the documentary film maker who Edward Snowden first cont

Hackers Attack SWIFT Penetrate System 2nd Time
Date

Hackers Attack SWIFT Penetrate System 2nd Time

Hackers have for the second time stolen money from banks using the SWIFT payment system. Now we have some technical details about the first attack. Usually when hacking news breaks the technical details are not given to the public. Often law enforcement tells the victim to keep those secret. Yet th

Is the US Army Cyber Command Effective or Not?
Date

Is the US Army Cyber Command Effective or Not?

The US Military has their own cybersecurity organization. It’s called the US Cyber Command. There is one for the Navy, Army, and Air Force.  Their main goal is to protect military communications but they also have attack capabilities. They say they use the same techniques as other hackers to go

How the US Military Built Encryption and the Internet
Date

How the US Military Built Encryption and the Internet

You might not know this, but the US Military created much of the encryption technology that we use today, including TOR, the cloaking software used by Edward Snowden and others. They also created SSL and the RSA algorithm. The US Military even invented the internet, in 1969. It was called ARPANET th

Bounty Bug Programs
Date

Bounty Bug Programs

It is a cliché to say it, but you have to think like a criminal in order to defeat a criminal. Some businesses and organization, from Samsung, to Google, to even the US Military, have come to the rational conclusion that if that you cannot defeat your enemies outright you can buy them off. So that

The Hacking Team
Date

The Hacking Team

Italy is not a country one usually thinks of when they think of hackers or even IT in general. With its perennially slow growing economy and focus on traditional businesses, like wine and sport cars, there are not a lot of startup tech companies there as compared to other places. Nor are there many

TrueCrypt Developers Abandon ISIS's Favored Encryption Tool
Date

TrueCrypt Developers Abandon ISIS's Favored Encryption Tool

An article in The New York Times in March of 2016 explained that one of the 2015 Paris Terror Attackers was shown two things when he first met up with his ISIS handlers: how to fire an assault rifle and how to use TrueCrypt encryption software. The terrorist recruit was given a USB drive with TrueCr