Lock picking might seem ridiculously old-fashioned at a cybersecurity gathering — but learning it can actually help people protect machines from digital threats. As security improves to block remote attacks over the internet, hackers look for ways to deliver malicious software physically instead — for instance, by breaking into a company’s data centers. Like cracking…
Highlights from the Black Hat Hacker Conference
Thousands of hackers and other cybersecurity professionals converged on Las Vegas on Wednesday for the annual Black Hat conference. Here are some highlights of the day’s events. ___ USB DANGERS What happens when you drop nearly 300 USB drives on a college campus? Spoiler alert: People not only pick them up, but they also plug…
What is Bitcoin? A Look at the Digital Currency
Bitcoin is a type of digital currency that allows people to buy goods and services and exchange money without involving banks, credit card issuers or other third parties. Its origins have long been a mystery — though an Australian man long rumored to have ties to bitcoin has come forward claiming to be its creator.…
Shadowy Hacking Industry May Be Helping FBI Crack An iPhone
Something New to Worry About: Connected Toy Security
Your smartphone or tablet is most likely pretty secure — not perfect, maybe, but generally unlikely to be hacked or to store, say, your email where other people could read it. The same can’t be said for any Internet connected toys you may have purchased for your kids. Recently discovered security flaws in a pair…
New California Law Extends Privacy Rights to Electronic Data
NEW YORK (AP) — California will require police to get a court order before they can search messages, photos and other digital data stored on phones or company servers in the nation’s most-populous state. Civil-liberties advocates called the new law that takes effect Jan. 1 an important advance and said it highlights the need for…