Posts Tagged ‘security’

The Demon Voice That Can Control Your Smartphone

Tuesday, January 31st, 2017

The Demon Voice That Can Control Your…phone Verbal malware: Yell into a crowd, “Hey #Siri, text mom, I’m pregnant”


“Here’s a fun experiment: Next time you’re on a crowded bus, loudly announce, “Hey Siri! Text mom, ‘I’m pregnant.’” Chances are you’ll get some horrified looks as your voice awakens iPhones in nearby commuters’ pockets and bags. They’ll dive for their phones to cancel your command.

But what if there was a way to talk to phones with sounds other than words? Unless the phones’ owners were prompted for confirmation—and realized what was going on in time to intervene—they’d have no idea that”

Yahoo discloses hack of 1 billion accounts

Tuesday, January 10th, 2017

Yahoo discloses #hack of 1 billion accounts Seems the scale of this affects a large fraction of all Internet users

Have I been pwned? Check if your email has been compromised in a data breach

Thursday, November 3rd, 2016

Inside macOS Sierra: Apple’s Optimized Storage and management features – Mac OS X Discussions on AppleInsider Forums

Monday, October 17th, 2016

Inside…Sierra: $AAPL’s Optimized Storage Strong filesystem-icloud integration. Maybe good but also heavy handed


“paxman said:
I am curious though, what do you mean by a very secure iCloud account? Do you just mean that you use two step verification and ‘difficult’ password? or is there something more?
Extremely strong password becaue it’s an internet-facing account that hold so much personal data
Password unique to that account
Notifcations of access attempts (if that’s possible to set up. I forget) Answers to personal questinons and birthday purposely inaccurate (in other words, the questions are a key to the get the correct answer generated randomly)”

Yahoo Says Hackers Stole Data on 500 Million Users in 2014 – The New York Times

Sunday, September 25th, 2016

Yahoo Says Hackers Stole Data on 500M in ’14 I haven’t yet received notice from @Yahoo to change my passwd. Why?


Bitcoin Rival Ethereum Gains Traction – WSJ

Monday, July 4th, 2016

#Bitcoin Rival Ethereum Gains Traction…. but suffers $55m theft due to hacked code. Wow!

NCBI retiring HapMap Resource

Friday, July 1st, 2016

Worrisome in rel. to #reproducibleresearch & maintaining secure resources … #saveHapMap Cf

@adamauton: Even as a @1000genomes advocate, this is not cool: #saveHapMap

Google Search Technique Aided N.Y. Dam Hacker in Iran

Sunday, April 10th, 2016

Google Search Technique Aided NY Dam Hacker in Iran Appears to be ‘#Google dorking,’ using operators like inurl:

Don’t Be Hacker Bait: Do This One-Hour Security Drill – WSJ

Sunday, February 7th, 2016

Here’s Why Public Wifi is a Public Health Hazard — Matter

Wednesday, January 6th, 2016

Why Public #Wifi is a…Hazard Exposes one’s past network usage; ergo, don’t put your street into your home’s SSID


Wouter removes his laptop from his backpack, puts the black device on the table, and hides it under a menu. A waitress passes by and we ask for two coffees and the password for the WiFi network. Meanwhile, Wouter switches on his laptop and device, launches some programs, and soon the screen starts to fill with green text lines. It gradually becomes clear that Wouter’s device is connecting to the laptops, smartphones, and tablets of cafe visitors.

On his screen, phrases like “iPhone Joris” and “Simone’s MacBook” start to appear. The device’s antenna is intercepting the signals that are being sent from the laptops, smartphones, and tablets around us.

“More text starts to appear on the screen. We are able to see which WiFi networks the devices were previously connected to. Sometimes the names of the networks are composed of mostly numbers and random letters, making it hard to trace them to a definite location, but more often than not, these WiFi networks give away the place they belong to.

We learn that Joris had previously visited McDonald’s, probably spent his vacation in Spain (lots of Spanish-language network names), and had been kart-racing (he had connected to a network belonging to a well-known local kart-racing center). Martin, another café visitor, had been logged on to the network of Heathrow airport and the American airline Southwest. In Amsterdam, he’s probably staying at the White Tulip Hostel. He had also paid a visit to a coffee shop called The Bulldog.