How to Hack an iPhone With a USB Charger

Monday, June 3rd, 2013

When it comes to threats to mobile devices, most people don't think of chargers as a likely point of attack. But plugging in an iPhone — or any smartphone or tablet — could come at a price. At next month's Black Hat security conference in Las Vegas, three Georgia Institute of ...

How to Secure USB Drives and Other Portable Storage Devices

Wednesday, May 29th, 2013

As individuals and organizations digitize more data, they become more susceptible to major data breaches. Though convenient, inexpensive USB flash memory sticks and other portable storage devices certainly don't help the cause, because workers use them transport databases and other confidential information. On top of the real danger of misused ...

Twitter Gets Two-Factor Authentication

Wednesday, May 22nd, 2013

Today we’re introducing a new security feature to better protect your Twitter account: login verification. This is a form of two-factor authentication. When you sign in to twitter.com, there’s a second check to make sure it’s really you. You’ll be asked to register a verified phone number and a confirmed email address. To get started, ...

Why Email is a Key to Your Castle

Tuesday, May 21st, 2013

Having control over an email account can be a lot of power, even though most people would probably say they do not care if someone else is reading their private emails. But it’s not always about reading those private emails. Of course there have been quite a few attacks where ...

Skype with care – Microsoft is reading everything you write

Saturday, May 18th, 2013

Anyone who uses Skype has consented to the company reading everything they write. The H's associates in Germany at heise Security have now discovered that the Microsoft subsidiary does in fact make use of this privilege in practice. Shortly after sending HTTPS URLs over the instant messaging service, those URLs receive an unannounced ...