Monthly Archives: October 2016

Why did ProtonMail vanish from Google search results for months?

Posted Oct 31, 2016/ by Natasha Lomas   If you’re the maker of a popular, zero access encrypted webmail product and suddenly discover your product is no longer featuring in Google search results for queries such as “secure email” and “encrypted email,” what do you conclude? That something is amiss, for sure. But the rather…
Read more

How did one contractor steal 50TB of NSA data? Easily, say former spies

The massive theft of secret NSA data, thought to be the largest breach of classified data in US history, happened over two decades.  By Zack WhittakeOctober 31, 2016   Image: file photo)     NSA whistleblower Edward Snowden might be the most well-known leaker of secret government files. But it's contractor Harold Martin who may…
Read more

The Complete Ethical Hacking Course for 2016/2017!

Gain the knowledge hackers use to compromise systems and use it to protect your own! Instructed by Ermin Kreponic, Joseph Delgadillo        About This Course Course Description If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or take your IT career to the next…
Read more

FCC imposes new consumer privacy rules on ISPs

The US regulatory agency will require broadband providers to get the approval of customers before sharing their sensitive information.  By Stephanie CondonOctober 28, 2016     The Federal Communications Commission (FCC) on Thursday approved new rules governing how internet service providers handle their customers' information. For the first time, ISPs like Comcast, as well as…
Read more

Hacker thrown behind bars after stealing nude celebrity photos

The "Celebgate" hacker conducted phishing campaigns to steal account credentials belonging to celebrities.  By Charlie OsborneOctober 28, 2016 CNET       A hacker that used social engineering to steal nude images of celebrities has been sentenced to 18 months in prison. Ryan Collins of Lancaster, Pennsylvania, attended court in the Middle District of Pennsylvania…
Read more

How to take down irritating drones without shooting them out of the sky

A researcher has demonstrated a way for attackers to hijack drones in the air without damaging them.  By Charlie OsborneOctober 27, 2016 Screenshot via YouTube     Not everyone is pleased with the emergence of hobbyist drones. Drones, otherwise known as unmanned aerial vehicles (UAVs), can be used for a variety of purposes -- such…
Read more

DOD Issues Cybersecurity Warning Against Lenovo Computers, Handheld Devices

Written by FEDmanager on 26 October 2016.     The Department of Defense is concerned that computers and handheld devices produced by China-based Company Lenovo could be used to spy on Pentagon networks, according to a recent internal study. The report, produced last month by the J-2 intelligence directorate, also warned that Lenovo is looking…
Read more

Military Warns Chinese Computer Gear Poses Cyber Spy Threat

Lenovo seeking access to classified Pentagon networks, J-2 report says BY: Bill Gertz  October 24,   The Pentagon’s Joint Staff recently warned against using equipment made by China’s Lenovo computer manufacturer amid concerns about cyber spying against Pentagon networks, according to defense officials. A recent internal report produced by the J-2 intelligence directorate stated that…
Read more