Ms. Smith

Ms. Smith (not her real name) is a freelance writer and programmer with a special and somewhat personal interest in IT privacy and security issues. She focuses on the unique challenges of maintaining privacy and security, both for individuals and enterprises. She has worked as a journalist and has also penned many technical papers and guides covering various technologies. Smith is herself a self-described privacy and security freak.

Half a billion smart devices vulnerable to decade-old DNS rebinding attacks

Half a billion smart devices vulnerable to decade-old DNS rebinding attacks

Researchers warned that 496 million smart devices used by enterprises are vulnerable to DNS rebinding attacks.

Microsoft’s Identity Bug Bounty program pays up to $100,000

Microsoft’s Identity Bug Bounty program pays up to $100,000

Microsoft’s new Identity Bounty program offers payouts of up to $100,000 for bugs in its identity solutions, as well as bugs in select OpenID standards.

Walmart teamed up with Microsoft to take on their rival Amazon

Walmart teamed up with Microsoft to take on their rival Amazon

Walmart, Amazon’s largest retail rival, inked a five-year agreement to use Amazon Web Services rival Azure as well as other Microsoft AI and machine learning projects.

IoT search engine ZoomEye cached passwords for tens of thousands of Dahua DVRs

IoT search engine ZoomEye cached passwords for tens of thousands of Dahua DVRs

IoT search engine ZoomEye scanned and stored Dahua DVR login credentials for anyone to find. Users should update vulnerable firmware before someone hacks the device.

Lawmakers ask FTC to investigate smart TV privacy concerns

Lawmakers ask FTC to investigate smart TV privacy concerns

Two senators, alarmed about the potential of smart TVs to spy on users, asked the FTC to investigate the privacy policies and practices of smart TV manufacturers.

Hackers steal $23.5M in cryptocurrency from 'decentralized' crypto exchange Bancor

Hackers steal $23.5M in cryptocurrency from 'decentralized' crypto exchange Bancor

Attackers used a compromised wallet to steal three different cryptocurrencies: $12.5 million of ether, $1 million of Pundi X, and $10 million of Bancor Network Tokens.

Microsoft-related bug reports up 121%, virtualization software bugs up 275%

Microsoft-related bug reports up 121%, virtualization software bugs up 275%

The Zero Day Initiative saw a 33% increase in the number of bugs reported so far in 2018, which may shatter 2017's 'busiest year ever' record.

Thieves hack Marathon gas station, steal $1,800 of gas

Thieves hack Marathon gas station, steal $1,800 of gas

Hackers used a 'remote device' to steal 600 gallons of gas, valued at $1,800, from a prepaid Marathon gas pump in Detroit.

Polar fitness app exposed personal information of soldiers and spies

Polar fitness app exposed personal information of soldiers and spies

Reporters used the Polar fitness app's Explore API to determine GPS location data of sensitive locations, as well as names and addresses of soldiers and spies.

Celebrate increased privacy: Supreme Court rules against warrantless location tracking

Celebrate increased privacy: Supreme Court rules against warrantless location tracking

Celebrate your Fourth Amendment rights, the Supreme Court’s ruling against warrantless location tracking, and the impact that may have on technologies in the future.

Quantum random number generator set to transform internet security

Quantum random number generator set to transform internet security

The world’s first practical quantum random number generator (QRNG) will reportedly overcome weaknesses of current encryption, revolutionizing internet security.

NSA deleting millions of phone call and text records over privacy violations

NSA deleting millions of phone call and text records over privacy violations

The NSA blames 'technical irregularities' in the call record data it received from telecoms for the mass purge of over 685 million phone and text message records.

Privacy breach: Home security camera footage sent to wrong person

Privacy breach: Home security camera footage sent to wrong person

Home security video from a Swann smart camera was sent to the wrong customer, enabling the person to see and hear activity of a different family.

IoT security a concern, but most companies don't have a way to detect attacks on ICS

IoT security a concern, but most companies don't have a way to detect attacks on ICS

Industrial organizations are concerned about IoT security, with 77% believing their ICS network will suffer an attack. Yet nearly half have no measures in place to detect such an attack.

Akamai: DDoS attacks on the rise, become more specialized

Akamai: DDoS attacks on the rise, become more specialized

Akamai's new State of the Internet/Security: Web Attack report says DDoS attacks increased 16% since 2017. It also says China and Russia launch the most credential abuse attacks on the hospitality industry.

8 AT&T buildings that are ‘central to NSA spying’

8 AT&T buildings that are ‘central to NSA spying’

Here are eight AT&T-owned locations, buildings that are reportedly central to the NSA's internet spying purposes.

Not hackers, but exes are remotely controlling smart devices as a form of domestic abuse

Not hackers, but exes are remotely controlling smart devices as a form of domestic abuse

A new pattern of domestic abuse behavior has ex-spouses and ex-partners remotely controlling smart devices in victims homes.

Decade-old attack can pwn Google Home, Chromecast, Sonos and Roku

Decade-old attack can pwn Google Home, Chromecast, Sonos and Roku

Several IoT devices are vulnerable to DNS rebinding attacks that could allow attackers to get your geographic location, gather recon for future attacks, or remotely control the devices.

China increases its surveillance state

China increases its surveillance state

China plans to add bio-recognition technology to subways and to install RFID chips in vehicle windshields.

Researchers disclose 7 flaws in 390 Axis IP cameras, remote attacker could take control

Researchers disclose 7 flaws in 390 Axis IP cameras, remote attacker could take control

If an attacker were to chain three of the flaws in the Axis IP cameras, they could remotely execute shell commands with root privileges. Update your firmware now.

Load More