If two state representatives get their way and their newly proposed law moves forward, then people in South Carolina will be blocked from accessing online porn after purchasing a new device.There are many missing pieces to fully explain how porn blocking would work under the Human Trafficking Prevent Act, and reading the bill doesn’t make it any clearer. However, the bill sponsors—Reps. Bill Chumley (R-Spartanburg) and Mike Burns (R-Greenville)—wrote that porn is a “public health hazard” and viewing porn online has impacted the “demand for human trafficking and prostitution.”To read this article in full or to leave a comment, please click here
If two state representatives get their way and their newly proposed law moves forward, then people in South Carolina will be blocked from accessing online porn after purchasing a new device.There are many missing pieces to fully explain how porn blocking would work under the Human Trafficking Prevent Act, and reading the bill doesn’t make it any clearer. However, the bill sponsors—Reps. Bill Chumley (R-Spartanburg) and Mike Burns (R-Greenville)—wrote that porn is a “public health hazard” and viewing porn online has impacted the “demand for human trafficking and prostitution.”To read this article in full or to leave a comment, please click here
The election is well over, but the storm is still brewing with no end in sight when it comes to trying to figure out what to do about Russian hacks aimed at influencing the election.On Sunday Dec. 11, US Senators John McCain, Chuck Schumer, Lindsey Graham and Jack Reed urged Majority Leader Mitch McConnell not to allow an investigation into Russian interference of the election to become a partisan issue. It’s an issue which “should alarm every American.”That same day, President-elect Donald Trump blew off the idea that the intelligence community had a clue as to whom was behind the hacks. His transition team later added, “These are the same people that said Saddam Hussein had weapons of mass destruction.”To read this article in full or to leave a comment, please click here
The election is well over, but the storm is still brewing with no end in sight when it comes to trying to figure out what to do about Russian hacks aimed at influencing the election.On Sunday Dec. 11, US Senators John McCain, Chuck Schumer, Lindsey Graham and Jack Reed urged Majority Leader Mitch McConnell not to allow an investigation into Russian interference of the election to become a partisan issue. It’s an issue which “should alarm every American.”That same day, President-elect Donald Trump blew off the idea that the intelligence community had a clue as to whom was behind the hacks. His transition team later added, “These are the same people that said Saddam Hussein had weapons of mass destruction.”To read this article in full or to leave a comment, please click here
If you enjoy good security-related reads, then you might like to check out a couple different takes on the latest ShadowBrokers’ NSA-linked Equation Group auction files. One comes from “the grugq,” a security researcher who is well-respected for his infosec and counterintelligence knowledge, and the other is by the cybersecurity researchers at Hacker House out of the UK.The Grugq published a three-part commentary series on the great cyber game – part 1, part 2, part 3. His deep analysis is his contribution since not many are capable of it. He said that the latest by the ShadowBrokers, dropped on Dec. 14, is a “massive” and valuable drop in terms of revealing to the NSA what the Russians know and have obtained.To read this article in full or to leave a comment, please click here
If you enjoy good security-related reads, then you might like to check out a couple different takes on the latest ShadowBrokers’ NSA-linked Equation Group auction files. One comes from “the grugq,” a security researcher who is well-respected for his infosec and counterintelligence knowledge, and the other is by the cybersecurity researchers at Hacker House out of the UK.The Grugq published a three-part commentary series on the great cyber game – part 1, part 2, part 3. His deep analysis is his contribution since not many are capable of it. He said that the latest by the ShadowBrokers, dropped on Dec. 14, is a “massive” and valuable drop in terms of revealing to the NSA what the Russians know and have obtained.To read this article in full or to leave a comment, please click here
Netgear stepped up by publishing a list of routers which are vulnerable to attack as well as releasing beta firmware to patch some of those models.The company confirmed the existence of the flaw which US-CERT believed was dangerous enough to advise users to stop using vulnerable routers. In addition to the originally announced vulnerable Netgear routers models R6400, R7000, R8000, Netgear warned that nine other router models are also vulnerable.To read this article in full or to leave a comment, please click here
Netgear stepped up by publishing a list of routers which are vulnerable to attack as well as releasing beta firmware to patch some of those models.The company confirmed the existence of the flaw which US-CERT believed was dangerous enough to advise users to stop using vulnerable routers. In addition to the originally announced vulnerable Netgear routers models R6400, R7000, R8000, Netgear warned that nine other router models are also vulnerable.To read this article in full or to leave a comment, please click here
For the last Patch Tuesday of 2016, Microsoft issued 12 security bulletins, half of which are rated critical due to remote code execution vulnerabilities. Get ready for restarts. Please do not delay deploying patches since three do address vulnerabilities which had been publicly disclosed.Rated criticalMS16-144 pertains to patching a plethora of bugs in Internet Explorer: two scripting engine memory corruption vulnerabilities, two memory corruption vulnerabilities, a security feature bypass bug, and two information disclosure flaws and one Windows hyperlink object library information disclosure vulnerability.To read this article in full or to leave a comment, please click here
For the last Patch Tuesday of 2016, Microsoft issued 12 security bulletins, half of which are rated critical due to remote code execution vulnerabilities. Get ready for restarts. Please do not delay deploying patches since three do address vulnerabilities which had been publicly disclosed.Rated criticalMS16-144 pertains to patching a plethora of bugs in Internet Explorer: two scripting engine memory corruption vulnerabilities, two memory corruption vulnerabilities, a security feature bypass bug, and two information disclosure flaws and one Windows hyperlink object library information disclosure vulnerability.To read this article in full or to leave a comment, please click here
With previous anti-First Amendment statements by President-elect Donald Trump, there has been some worry by journalists that writing something the soon-to-be President doesn’t like may result in unpleasant consequences. Yet that is not the same thing as reporting “fake” news or spreading disinformation.To read this article in full or to leave a comment, please click here
With previous anti-First Amendment statements by President-elect Donald Trump, there has been some worry by journalists that writing something the soon-to-be President doesn’t like may result in unpleasant consequences. Yet that is not the same thing as reporting “fake” news or spreading disinformation.To read this article in full or to leave a comment, please click here
Netgear router owners, I hope you have a spare router – at least those of you with remotely exploitable models, since US-CERT recommended discontinuing use of router models which are vulnerable to arbitrary command injection.Which models? Right now it looks like Netgear R7000, R6400 and R8000 routers, but there may be more models that are vulnerable. Should you really take this seriously and unplug your router? You betcha, since US-CERT said it is “trivial” to exploit this vulnerability. Visit a booby-trapped page and whammo! An attacker would be saying hello to root privileges on your router.An exploit, which was released on Exploit Database, was published on Dec. 7. Netgear has yet to issue new firmware to patch the flaw in its vulnerable routers. There is a way to test if your router is vulnerable and even a non-official temporary fix you can try if tossing out your router is not an option.To read this article in full or to leave a comment, please click here
Netgear router owners, I hope you have a spare router – at least those of you with remotely exploitable models, since US-CERT recommended discontinuing use of router models which are vulnerable to arbitrary command injection.Which models? Right now it looks like Netgear R7000, R6400 and R8000 routers, but there may be more models that are vulnerable. Should you really take this seriously and unplug your router? You betcha, since US-CERT said it is “trivial” to exploit this vulnerability. Visit a booby-trapped page and whammo! An attacker would be saying hello to root privileges on your router.An exploit, which was released on Exploit Database, was published on Dec. 7. Netgear has yet to issue new firmware to patch the flaw in its vulnerable routers. There is a way to test if your router is vulnerable and even a non-official temporary fix you can try if tossing out your router is not an option.To read this article in full or to leave a comment, please click here
The Electronic Privacy Information Center (EPIC) is calling upon the Federal Trade Commission (FTC) to take action against “toys that spy” and violate federal privacy law. In particular, EPIC has issues with My Friend Cayla dolls and i-Que Robots which “subject young children to ongoing surveillance.”EPIC – along with Campaign for Commercial Free Childhood, the Center for Digital Democracy, and the Consumers Union – are working “to ban these toys from the marketplace.”To read this article in full or to leave a comment, please click here
The Electronic Privacy Information Center (EPIC) is calling upon the Federal Trade Commission (FTC) to take action against “toys that spy” and violate federal privacy law. In particular, EPIC has issues with My Friend Cayla dolls and i-Que Robots which “subject young children to ongoing surveillance.”EPIC – along with Campaign for Commercial Free Childhood, the Center for Digital Democracy, and the Consumers Union – are working “to ban these toys from the marketplace.”To read this article in full or to leave a comment, please click here
Lots of IT techs have access to network credentials to access company files and emails, but it wouldn’t cross the minds of most to abuse that knowledge for a “get-rich-scheme” in the flavor of insider trading. Yet that doesn’t apply to everyone, since a 28-year-old admitted to exploiting his position in order to gain insider knowledge and illegally trade and profit from those secrets.Jonathan Ly, a former IT tech for Expedia, pleaded guilty to securities fraud – something FBI Special Agent in Charge Jay S. Tabb, Jr. called, “Particularly egregious because Mr. Ly abused his special access privileges as an IT administrator. On top of violating the trust of the public and his company, he violated the privacy of fellow employees by surreptitiously accessing their files.”To read this article in full or to leave a comment, please click here
Lots of IT techs have access to network credentials to access company files and emails, but it wouldn’t cross the minds of most to abuse that knowledge for a “get-rich-scheme” in the flavor of insider trading. Yet that doesn’t apply to everyone, since a 28-year-old admitted to exploiting his position in order to gain insider knowledge and illegally trade and profit from those secrets.Jonathan Ly, a former IT tech for Expedia, pleaded guilty to securities fraud – something FBI Special Agent in Charge Jay S. Tabb, Jr. called, “Particularly egregious because Mr. Ly abused his special access privileges as an IT administrator. On top of violating the trust of the public and his company, he violated the privacy of fellow employees by surreptitiously accessing their files.”To read this article in full or to leave a comment, please click here
How do you feel about sharing your location with “trusted contacts”? From Google’s point of view, its new Trusted Contacts app will “help you feel safe and give your friends and family peace of mind.”The “personal safety app” will work even if your phone is offline.Google software engineer Minh Nguyen explained:
Here’s how it works: Once you install the Android app, you can assign “trusted” status to your closest friends and family. Your trusted contacts will be able to see your activity status — whether you’ve moved around recently and are online — to quickly know if you're OK. If you find yourself in a situation where you feel unsafe, you can share your actual location with your trusted contacts. And if your trusted contacts are really worried about you, they can request to see your location. If everything’s fine, you can deny the request. But if you’re unable to respond within a reasonable time-frame, your location is shared automatically and your loved ones can determine the best way to help you out. Of course, you can stop sharing your location or change your trusted contacts whenever you want.To read this article in full or Continue reading
How do you feel about sharing your location with “trusted contacts”? From Google’s point of view, its new Trusted Contacts app will “help you feel safe and give your friends and family peace of mind.”The “personal safety app” will work even if your phone is offline.Google software engineer Minh Nguyen explained:
Here’s how it works: Once you install the Android app, you can assign “trusted” status to your closest friends and family. Your trusted contacts will be able to see your activity status — whether you’ve moved around recently and are online — to quickly know if you're OK. If you find yourself in a situation where you feel unsafe, you can share your actual location with your trusted contacts. And if your trusted contacts are really worried about you, they can request to see your location. If everything’s fine, you can deny the request. But if you’re unable to respond within a reasonable time-frame, your location is shared automatically and your loved ones can determine the best way to help you out. Of course, you can stop sharing your location or change your trusted contacts whenever you want.To read this article in full or Continue reading