The Chinese government announced this week that it believes an internet outage that has hit the country is the result of a cyber attack. Web users within the country were … Continue reading
Just a few days after Obama’s awaited, and disappointing to some, speech about the NSA’s program, an independent federal body came out with its own rather scathing analysis of the … Continue reading
Vital control systems used by energy, water, and transportation are ill-prepared to cope with online terrorism and hacking threats, the EU’s cyber security agency has warned, blaming patchy and inconsistent … Continue reading
Google’s Chrome browser is under fire after speech recognition researchers identified a vulnerability that allows websites to clandestinely record users through their computer’s microphone, though some have questioned quite how … Continue reading
Microsoft to let foreign customers store data on non-US servers following NSA debacle
Posted in: Today's ChiliMicrosoft has made a decision that runs afoul of many tech companies’ sensibilities — allowing foreign customers to have their data stored on non-US servers. Such a decision was prompted … Continue reading
A lot of people I know mix up their passwords because they have so many accounts online. Sometimes, it gets difficult to keep track of all the passwords you’ve created and used over the years.
Aiming to provide an alternative to passwords is eyeLock’s Myris iris scanner.
The Myris is exactly what its name implies. But how do you use it?
Well, first of all, you’ll have to set up a profile and key in all of your passwords. You’re then supposed to “teach” Myris how to recognize your eyeballs by following a short series of instructions. From that point forward, you will then be able to log in your email, bank, and social media accounts simply by having the Myris scan both of your eyes.
The team behind Myris claims that a double-iris scan is one of the most foolproof biometric security systems available, offering a false acceptance rate that is only bested by a DNA test. In fact, the chances of a false match are 1 in 2.25 trillion.
Myris will be available later this year and will be priced between $200 to $300(USD).
[via Dvice]
Two researchers were recently using custom software to test out Tor exit nodes for suspicious behavior and discovered something interesting. The researcher spent four months studying Tor exit nodes and … Continue reading
Wouldn’t it be awesome if websites had the ability to morph and shift its code on a regular basis to prevent malware from attacking it? That definitely sounds like a pretty awesome idea which is currently being used by a company called Shape Security. The company’s product, called the ShapeShifter is basically a network security appliance that relies on real-time polymorphism that will dynamically change the code in a website’s user interface into random strings that will prevent malware from attacking it, essentially turning it into a moving target that is much harder to hit. While it seems like a lot is happening under the surface, the website’s UI is apparently not affected and will retain the functionality of HTML, CSS, and JavaScript, whichever is being used at the moment.
The polymorphism will allow ShapeShifter to block attacks such as account takeovers, application distributed denial of service, and Man-in-the-Browser. Apparently this is how some malware attacks websites but according to Shape Security’s VP of Strategy, Shuman Ghosemajumder, a malware attack uses “the same fundamental concept of polymorphism, but the implementation is different.” Unfortunately Shape Security’s ShapeShifter solution does not come cheap and is currently available as a hardware appliance for now, although a cloud-based version is under development, and is priced upwards of a million dollars. This means that the average joe looking to protect their website will have to look elsewhere, but websites belonging to financial institutions, health care, or major e-commerce institutions will most likely be potential clients for Shape Security.
ShapeShifter Will Morph A Website’s Code To Deflect Malware Attacks original content from Ubergizmo.
Emojis look cute in your inbox and chat windows, but they reveal nothing about the true nature of the person on the other end. Of course, you can probably vouch for people you actually know.
But what about strangers who chat you up because they find your avatar pretty or because they find your username clever? You might know better than to fall for such lines and assume that you’re chatting with a nice person because of the plethora of smiling and winking emojis he’s sending your way – but kids don’t. That can easily make them susceptible to online predators who prey on the young and innocent.
With this in mind, international non-profit Innocence en Danger commissioned ad agency Rosapark to create a series of images using creepy, real-life emoticons to raise awareness on these dangers kid can encounter online.
The posters and gargantuan emoji-fied faces are beyond creepy. Hopefully, the campaign will encourage more parents to pay attention to what their kids are doing online.
[via Laughing Squid]
Hacker accesses 70,000 Healthcare.gov records, says website is 100% insecure
Posted in: Today's ChiliThe Healthcare.gov website has had its fair share of troubles since launch, and one that has been persistent among them is claims of security vulnerabilities. TrustedSec’s CEO David Kennedy has … Continue reading