Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

February 27 2014

Sponsored post

Soup.io will be discontinued :(

Dear soup.io fans and users,
today, we have to share very sad news. Soup.io will stop working in less than 10 days. :(
It's breaking our heart and we honestly tried whatever we could to keep the platform up and running. But the high costs and low revenue streams made it impossible to continue with it. We invested a lot of personal time and money to operate the platform, but when it's over, it's over.
We are really sorry. Soup.io is part of the internet history and online for one and a half decades.
Here are the hard facts:
- In 10 days the platform will stop working.
- Backup your data in this time
- We will not keep backups nor can we recover your data
July, 20th, 2020 is the due date.
Please, share your thoughts and feelings here.
Your Soup.io TEAM
Reposted bydotmariuszMagoryannerdanelmangoerainbowzombieskilledmyunicorntomashLogHiMakalesorSilentRulebiauekjamaicanbeatlevuneserenitephinangusiastysmoke11Climbingpragne-ataraksjisauerscharfArchimedesgreywolfmodalnaTheCrimsonIdoljormungundmarbearwaco6mieczuuFeindfeuerDagarhenvairashowmetherainbowszpaqusdivihindsightTabslawujcioBateyelynTabslaensommenitaeliblameyouHalobeatzalicexxxmgnsNorkNorkarthiimasadclownwhatssurpriseme

February 24 2014

February 21 2014

February 20 2014

February 15 2014

February 04 2014

Report: U.S. Government Is as Bad at Passwords as You Are

Most of us are pretty bad at coming up with secure passwords. But as it turns out, we may not be alone: U.S government agencies and their employees are just as challenged as the rest of us.

Several government agencies, including the Department of Homeland Security, the Internal Revenue Service and the Nuclear Regulatory Commission — all of which store highly sensitive data — are reportedly plagued with a host of serious vulnerabilities that leave their networks open to hackers. And according to the new Senate cybersecurity report, the agencies and the employees themselves are responsible for these weaknesses. Read more...

More about Security, Passwords, Cybersecurity, Us World, and Us

January 29 2014

Victim of Epic Hack Points Finger at GoDaddy and PayPal

Passwords, even strong ones, aren't enough to protect you. Your online accounts are only as safe as the security policies of the companies that hold them.

At least that's the apparent lesson to be learned from Naoki Hiroshima's epic account of how one hacker used a series of simple social-engineering tactics to gain control of his online accounts without using a single password.

Naoki Hiroshima claims to have tweeted using the @n handle since signing up for Twitter in 2007. In that time, he said, he has fended off multiple attempts by attackers to take control of the coveted one-character account. He claims he was once even offered $50,000 in exchange for the handle. Read more...

More about Twitter, Security, Paypal, Godaddy, and Passwords

January 25 2014

Apple CEO Tim Cook Addresses NSA Concerns in New Interview

Despite positive memories of the Mac’s 30th anniversary, questions still loom over Apple’s relationship with the National Security Agency following allegations that the Cupertino, Calif. company worked with the NSA to create a backdoor in its products to access communications

Apple CEO Tim Cook once again addressed those allegations in a rare sit-down interview with ABC News

“Much of what has been said isn't true,” Cook said. “There is no back door. The government doesn't have access to our servers. They would have to cart us out in a box for that, and that just will not happen. We feel that strongly about it.” Read more...

More about Security, Apple, Tim Cook, Tech, and Us

January 24 2014

Hacker Breaks Snapchat's New Security Feature in 30 Minutes

Another hacker has publicly bested Snapchat's security features.

A blog post published Wednesday shows how developer Steven Hickson was able to bypass Snapchat's most recent security feature, which attempts to protect the service against bot accounts

The feature was included in Snapchat's most recent app update, and requires new users to identify pictures that contain the company's ghost logo out of a collection of images

The extra step was meant to work as a human verification system so that malicious software could not create new accounts automatically. But Hickson claims he was able to write a program to identify the ghost images automatically — in around 30 minutes. Read more...

More about Security, Hack, Social Media, Apps Software, and Snapchat

January 23 2014

U.S. Accuses Snowden Background Check Firm of Fraud

The security firm that conducts 45% of all background checks for potential U.S. government employees may have falsified hundreds of thousands of background checks over a four-year period

The Justice Department is accusing U.S. Investigations Services (USIS) of using computer software to "flush" or "dump" 665,000 background checks, submitting them as complete when the company actually had not conducted a thorough review of the candidates, according to a complaint filed on Wednesday. Prosecutors said USIS did so with 40% of all background checks between March 2008 and September 2012, defrauding the government of millions of dollars. Read more...

More about Security, Department Of Justice, Background Checks, Us World, and Us
Snapchat Attempts to Block Fake Accounts With Ghost Captchas

Snapchat is trying to make it more difficult for hackers to spam your phone number

The photo-messaging app has rolled out a new form of captcha to prevent fake users from signing up for an account, according to TechCrunch.

Rather than decoding words, new users are required to select images that contain ghosts from a grid before registration can proceed. This is what the prompt looks like:

Snapchat Captcha screen

Image: Snapchat; Screenshot by Mashable

The new form of captcha is designed to help prevent hackers from creating fake users for the purpose of exploiting Snapchat's "find friends" database. Earlier this month, that feature was used to create SnapchatDB, a database that leaked 4.6 million usernames and phone numbers. Read more...

More about Security, Captcha, Tech, Apps Software, and Mobile

January 20 2014

Almost 40% of South Korea Hit in Major Credit Card Hack

A lone hacker has leaked data from the credit cards of 20 million in South Korea, meaning the personal data of about 40% of the country's population has been compromised.

A contract IT worker for Korea Credit Bureau, the office that produces credit scores in that country, stole the data. That contractor has since been arrested, and the three CEOs of the affected credit card companies — KB Kookmin Card, Lotte Card and NH Nonghyup Card — have publicly apologized (see above)

Korea's national financial regulator, the Financial Services Commission, aid the credit card firms will cover any financial losses customers incurred because of the hack. Regulators have launched probes of the credit card companies' security measures Read more...

More about Security, World, Credit Cards, South Korea, and Business

January 15 2014

Blackphone Could Be the First NSA-Proof Phone

An upcoming smartphone called Blackphone aims to put privacy in your hands, protecting you from anyone wanting to snoop into your private data — even the NSA

A Switzerland-based join venture between Silent Circle and Geeksphone, the project is backed by several important figures in the fields of computer security, including Phil Zimmermann, creator of data encryption protocol PGP (Pretty Good Privacy)

Blackphone is powered by a "security-oriented" Android build called PrivatOS. It's carrier- and vendor-independent, and enables users to make and receive secure phone calls and video chats, exchange secure texts as well as transfer and store files Read more...

More about Security, Smartphone, Privacy, Tech, and Mobile

January 14 2014

Can Machines Keep You Safer at Airports Than Humans?

Airports worldwide are starting to replace security officials with machines to identify passengers, and those machines could soon start checking your bags.

The machines should make the check-in process safer and more efficient, allowing passengers a stress-free flying experience. But some think reliance on automated security poses a host of potential dangers.

In many ways, machines can more quickly and accurately determine who should be allowed to board a plane. If someone is trying to pass as someone else, he could be pretty convincing with a hairstyle change or colored contact lenses. But you can't alter your irises, which is how machines in some airports across Europe, Australia and the United States identify passengers. This makes it much more difficult to pass off as your buddy. Read more...

More about Security, Airport, Machine, Us World, and Us

January 13 2014

Target CEO: There Was Malware in Our Point-of-Sale Registers

Target CEO Gregg Steinhafel shed more light on the data breach at his company's stores Monday morning, citing "malware installed at our [point-of-sale] registers" and vowing to make "significant changes."

"Clearly, we're accountable, and we're responsible. But we're gonna come out at the end of this a better company," Steinhafel said during an interview on CNBC. "And we're gonna make significant changes."

He added: "We are not gonna rest until we understand what happened and how that happened."

Target last week disclosed that data from as many as 110 million customers may have been compromised during two cyberattacks. In December, Target admitted that credit card details from 40 million customers were at risk. The company said last week that an internal probe revealed data like names, physical addresses, email addresses and phone numbers from 70 million customers were also at risk. Though there may be some overlap between the two incidents, the retailer said as many as 110 million customers may have been affected. Read more...

More about Security, Target, Business, Advertising, and Marketing

January 06 2014

Forget Fingerprints: EyeLock Myris Brings Eye Scanning to Devices

LAS VEGAS — Fingerprint scanning is all the rage ever since Apple put it at everyone's fingertips in the iPhone 5S, but one company has an arguably better take on biometric securityEyeLock is a company that develops iris scanners for security checkpoints, and now it's putting that tech into a consumer device.

The myris is computer mouse-size device that scans your eye. You plug it into the USB port on your computer, tablet or some other device. Pick it up, flip it over, look at it, and the sensor will immediately scan your eye to verify your identity.

More about Security, Ces, Tech, Dev Design, and Gadgets

January 05 2014

Samsung Introduces Two New Smart Security Cameras

Bumping up the quality of do-it-yourself home security tools, Samsung has unveiled a new set of security cameras that you can control using a mobile app on your tablet or smartphone.

The SmartCam HD ($179) comes from the same family as the security device unveiled by Samsung in September. The company's newly designed indoor security camera includes 32GB of locally stored microSD memory and a built-in microphone and speaker that allows for two-way remote communication

Equipped with an IR Cut Filter for enhanced daytime and nighttime video capture, the SmartCam's system also features Motion Zone Selection, a software option that lets you specify motion detection for a particular area within the camera's field of view Read more...

More about Security, Samsung, Ces, Tech, and Gadgets

January 03 2014

Medical Examiner Rules Hacker Barnaby Jack Died of a Drug Overdose

Nearly six-months after his sudden death, the autopsy report for revered hacker Barnaby Jack reveals that the New Zealand-born security professional died of an accidental drug overdose

Jack, who was living in San Francisco, died of a mixed overdose of heroin, cocaine, Benadryl and Xanax and was "mannered an accident" by the San Francisco Medical Examiner's office, according to Vice.

Jack was the director of embedded device security at the security consulting firm IOActive. He was best known for demonstrating — on-stage — how to hack an ATM to make it spit out money, as well as how to wirelessly hack medical devices. He died just days before he was to give a presentation at the 2013 Black Hat security conference in Las Vegas. During his presentation, Jack was going to demonstrate how he could override the software in a pacemaker from up to 30 feet away in order to send a high-voltage shock strong enough to kill someone Read more...

More about Security, Hackers, Black Hat, Us World, and Us

December 30 2013

The Evolution of the Password — And Why It's Still Far From Safe

Just a decade ago, password theft seemed the province of poorly protected Hotmail accounts and AIM screen names. These days, virtually every company with access to our personal data, from Target to The New York Times to Facebook and Gmail, has been hacked. The password is the sentry that guards this mass of sensitive data — credit cards, addresses, social security numbers — and yet, more than 50 years since its invention, researchers and developers are still figuring out how to fix what has always been a little bit broken.

The first computer password was developed in 1961 at the Massachusetts Institute of Technology, for use with the Compatible Time-Sharing System (CTSS), which gave rise to many of the basic computing functions we use today. CTSS was designed to accommodate multiple users at once, with the same core processor powering separate consoles. As such, each researcher needed a personal point-of-entry into the system. Read more...

More about Security, Features, Hackers, Passwords, and Tech
Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.
No Soup for you

Don't be the product, buy the product!

YES, I want to SOUP ●UP for ...