Gear to Block ‘Juice Jacking’ on Your Mobile

Wednesday, June 18th, 2014

Ever since I learned about the threat of “juice-jacking” — the possibility that plugging your mobile device into a random power charging station using a USB cord could jeopardize the data on that device — I’ve been more mindful about bringing a proper power-outlet charging adapter on my travels. But in the ...

Your Android phone viewed illegal porn. To unlock it, pay a $300 fine

Wednesday, May 7th, 2014

Researchers have uncovered Android-based malware that disables infected handsets until end users pay a hefty cash payment to settle trumped-up criminal charges involving the viewing of illegal pornography. To stoke maximum fear, Android-Trojan.Koler.A uses geolocation functions to tailor the warnings to whatever country a victim happens to reside in. The screenshot ...

LaCie admits to year-long credit card breach

Tuesday, April 15th, 2014

LaCie is the latest major retailer and tech company finding itself to be the target of a major security breach by unknown assailants. The French hardware company confirmed in a statement on Tuesday that malware successfully made its way through to access sensitive customer information stemming from transactions on its website. Here's where things ...

More than 24M home routers enabling DNS amplification DDoS attacks

Thursday, April 3rd, 2014

Tens of millions of the home routers we rely on everyday for internet access are enabling Domain Name System (DNS) based distributed denial-of-service (DDoS) attacks, and owners may never even know it, according to research by DNS software provider Nominum. Working collaboratively with the Open Resolver Project, Nominum learned that open ...

Security vulnerabilities found in 80% of best-selling SOHO wireless routers

Friday, February 21st, 2014

Tripwire has analyzed the security provided by the most popular wireless routers used in many small and home offices and found that 80 percent of Amazon’s top 25 best-selling SOHO wireless router models have security vulnerabilities. Of these vulnerable models, 34 percent have publicly documented exploits that make it relatively simple ...