Blog

You Know Those New Chips in Your Credit Card? They’re Failing You Miserably

By Carey Wedler    09-23-2016   Americans have spent much of 2016 lamenting the addition of chips into their credit and debit cards. In exchange for the extra few moments consumers spend checking out, however, they are promised enhanced security to protect their accounts. But a new discovery unveiled Wednesday by professional hackers at the Black Hat…
Read more

This Hacker Says He Stole More NSA Hacking Tools

William Turton nsa leak  09-23-2016 Last week, a group of mysterious hackers dumped hacking tools from the world’s most powerful spying group, the National Security Agency, and demanded millions in dollars of bitcoins to reveal more tools it accessed. Now, a separate hacker is claiming that he has the rest of the tools. Using the moniker…
Read more

Judge Rules FBI Can Hack Your Email (Here’s How You Stop Them)

FBI Hacking Mark  Nestmann Privacy Surveillance August 23, 2016 By Mark Nestmann, The Nestmann Group What’s the biggest threat to your civil liberties? Is it Congress crushing every loophole you grasp at for privacy? That’s a nightmare, but there are bigger. Is it the rise of presidential candidates who pledge to dismantle fundamental legal protections? Good guess,…
Read more

How Bitcoin helped fuel an explosion in ransomware attacks

Secure payment system Bitcoin has many legitimate uses, but like other technologies, it's also been beneficial to cybercriminals seeking new ways to extort money.  By Danny Palmer | August 22, 2016  More often than not, hackers will demand a ransom payment be made in Bitcoin Image: Proofpoint   Ransomware is booming. Be it Locky, CryptXXX…
Read more

Will More Federal Employees Learn To Code Any Time Soon?

Morrowind/Shutterstock.com It's well known that the federal government is facing a shortage of tech talent: A survey released in June showed that about 63 percent of federal CIOs felt their agencies were “not at all” or “insufficiently” prepared for talent development needs. Despite the talent deficit, federal attempts to offer coding classes appear to be…
Read more

How does a security passcard work?

Tech | Authentication   Security pass cards are often used to gain entry into areas and buildings with restricted access. The security pass card may be for general access, meaning that the pass card does not provide data about the person using it, or it may be individually encoded, containing specific information about the cardholder.…
Read more

What is a digital signature?

A digital signature is basically a way to ensure that an electronic document (e-mail, spreadsheet, text file, etc.) is authentic. Authentic means that you know who created the document and you know that it has not been altered in any way since that person created it. Digital signatures rely on certain types of encryption to…
Read more

PGP security weakness exposed

If you're still using 32-bit PGP keys, you only think you have security. But you really don't. It would take a cracker about four seconds to forge your PGP signature.  By Steven J. Vaughan-Nichols for Zero Day | August 18, 2016 As Randall Munroe, creator of xkcd, pointed out, PGP is far more secure in…
Read more