Articles by Lisa Vaas
Not only was the Justin Bieber-Selena Gomez sex tape fake, it weaseled Facebook session account tokens out of many who clicked on it, then replicated itself onto their newsfeeds. Facebook's tried and tried to scrape the guy off, it says, but he keeps coming back for more.
An FBI memo sent out on Thursday described the attacks as "a widespread problem that should be addressed", according to Reuters.
Two search giants, Google and Microsoft, have agreed on measures that should make it harder to search for child abuse images online on the open internet, while Google has made a groundbreaking move to identify and ferret out videos made by paedophiles on its YouTube service.
None of the attacks have been particularly damaging, and the DDoS tool, dubbed "Destroy Obama Care", was never actually triggered. Now, the government's doing pen testing, which likewise hasn't come up with any egregious holes in the site's defense.
The kill switch - aka Standard Operating Procedure 303 - describes a shutdown and restoration process for wireless networks in the event of a national crisis that would prevent, among other things, the remote triggering of radio-activated explosives.
Snapchat has reportedly thumbed its nose at Facebook's $3 billion, all-cash offer. The WSJ says Facebook's just one of many eager suitors currently wooing the supposedly-disappearing-photo service (a claim that at least one researcher has disproved), and it's not even the most generous.
Worldwide requests have more than doubled since 2009, while the US - which is once again the most voracious data requester - has more than tripled its requests for information on Google customers.
You can't get out of cooperating with government-ordered electronic surveillance by shutting down, any more than a business can stop police from executing a search warrant by locking its front gate, the US government tutted at former encrypted-email provider Lavabit.
A US court has turned the tables on child predators who use technology to share images of the abuse, ruling that investigators' use of an automated search tool to ferret out known child porn images was not a violation of the defendants' Fourth Amendment rights against unreasonable search.
Blessed be Facebook for using this real-world example to 100% back up Naked Security when we proselytize about the evils of password reuse. And if you're worried that Facebook's mining of breached Adobe customer records and quarantining of users is Big Brother-ish, fear not: the company didn't have to store passwords in clear text or pull any other boneheaded security move to know just what its customers' reused passwords are.
Edwin Vargas was charged with using PayPal to hire someone to hack login details for at least 43 personal email accounts, including those of 20 current or former NYPD officers.
Police and other authorities are using smartphones and tablets to snap photos in the field, without warrants or asking for subjects' permission to run their images against criminal databases. The program was rolled out without public hearings or notice, and could represent the beginning of a national rollout.
In yet another "don't open that e-birthday card" saga, 33-year-old Carlos Enrique Perez-Melara, now on the FBI's 10 most wanted cybercriminals list, allegedly sold malware that planted a keylogger, as well as remotely controlling a victim's computer and webcam.
Trusted old-timers from the original site are staffing the relaunched site, and now it's offering PGP encryption. Is the site a sticky trap for luring more drug aficionados or is it enough to save users from the fate that's befallen all those arrested in connection with the original site?
The term refers to telling customers what you're not allowed to tell customers: namely, that you've been served with a subpoena for data, with attendant gag order, sometime during a given time span. This passive method of informing-by-omission is done by an ISP telling customers when the subpoena *hasn't* been served - a maneuver now legal, albeit untested in court, and Apple's one of the first big-name tech companies to try it.
Using Hollywood-style animation techniques, researchers created a lifelike character and seeded 19 public online chat forums with her very convincing live-action image. Over 20,000 alleged predators asked her to perform paid sex acts over the course of 10 weeks, of whom 1,000 were identified, using no hacking methods whatsoever.
Fast on the heels of reports that Russia allegedly passed out boobytrapped USB sticks at the G20 summit, iPads were plucked from users' hands at a UK Cabinet meeting out of fear that they might be bugged by foreign intelligence agencies.