Hacking Wisdom
Follow
Find
4.9K views | +0 today
 
Scooped by Hacking Wisdom
onto Hacking Wisdom
Scoop.it!

Google 'Pressure Cookers' and 'Backpacks,' Get a Visit from the Cops

Google 'Pressure Cookers' and 'Backpacks,' Get a Visit from the Cops | Hacking Wisdom | Scoop.it
Michele was Googling pressure cookers. Her husband was looking at backpacks. So six men from a joint terrorism task force showed up at their house. How'd the government know what they were Googling? 
more...
Sylvan Ravinet's curator insight, August 2, 2013 5:31 AM

"One hundred times a week, groups of six armed men drive to houses in three black SUVs, conducting consented-if-casual searches of the property perhaps in part because of things people looked up online."

Hacking Wisdom
Your new post is loading...
Your new post is loading...
Scooped by Hacking Wisdom
Scoop.it!

European Smart Grid Cyber Security Conference - March, 9th-10th 2015 - London

European Smart Grid Cyber Security Conference - March, 9th-10th 2015 - London | Hacking Wisdom | Scoop.it

Alessandro Parisi (StartITHub‘s chairman, Hacking Wisdom‘s curator) will intervene, with a speech titled:


“Data Driven Strategies for Prioritizing Malicious Code Threats within Cloud and Smart Grids Infrastructures”

(scheduled on March, 10th 2015, at 16.30).

 

Speech Abstract

- How Smart Grids changed the Security Risk Landscape

- Delving into Critical Infrastructure Security Threats

- The Smart Grid as an Opportunity for Big Data Cybersecurity

- AnalyticsProtecting Smart Grids with Proactive Security

- ApproachesPrioritization Strategies for Smart Grids Malware Analysis

 

 

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

The Equation group: questions and answers | Hacking Wisdom

As Kaspersky Labs’ Global Research & Analysis Team recently revealed, the Equation group is probably one of the most sophisticated cyber attack groups in the world, and they represent one of the most advanced threat actor ever seen.

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Yoast Google Analytics Stored Cross Site Scripting | Hacking Wisdom

A security vulnerability in the plug-in allows an unauthenticated attacker to store arbitrary HTML, including JavaScript, in the WordPress administrator’s Dashboard on the target system.
The JavaScript will be triggered when an administrator views the plug-in’s settings panel. No further user interaction is required.

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Health Information Privacy at stake | Hacking Wisdom

According to a study, a significant percentage of health-related websites using third-party ads, are prone to sensitive information leakage, potentially revealing visitors’ health interests.

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Mozilla's Flash-killer 'Shumway' appears in Firefox nightlies

Mozilla's Flash-killer 'Shumway' appears in Firefox nightlies | Hacking Wisdom | Scoop.it
Open source SWF player promises alternative to Adobe's endless security horror
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Windows 10 to adopt Fido post-password protection

Windows 10 to adopt Fido post-password protection | Hacking Wisdom | Scoop.it
Soon you won't have to remember your mother-in-law's middle name backwards*
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Suite of Sophisticated Nation-State Attack Tools Found With Connection to Stuxnet | WIRED

Suite of Sophisticated Nation-State Attack Tools Found With Connection to Stuxnet | WIRED | Hacking Wisdom | Scoop.it
CANCUN, Mexico—The last two years have been filled with revelations about NSA surveillance activities and the sophisticated spy tools the agency uses to take control of everything from individual systems to entire networks. Now it looks like researchers at Kaspersky Lab may have uncovered some of these NSA tools in the wild on customer machines,…
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Lenovo installs adware on customer laptops and compromises ALL SSL.

Lenovo installs adware on customer laptops and compromises ALL SSL. | Hacking Wisdom | Scoop.it
A pretty shocking thing came to light this evening - Lenovo is installing adware that uses a "man-in-the-middle" attack to break secure connections on affected laptops in order to access sensitive ...
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

One-Bit To Rule Them All: Bypassing Windows’ 10 Protections using a Single Bit - Breaking Malware

One-Bit To Rule Them All: Bypassing Windows’ 10 Protections using a Single Bit - Breaking Malware | Hacking Wisdom | Scoop.it
Introduction Today, Microsoft released their latest Patch Tuesday. This Patch includes a fix for vulnerability CVE-2015-0057, an IMPORTANT-rated exploitable vulnerability which we responsibly disclosed to Microsoft a few months ago. As part of our research, we revealed this... Read More
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Tech firms urged to share data with US

Tech firms urged to share data with US | Hacking Wisdom | Scoop.it
The US president urges tech firms to share more information with security services, as leading figures gather for a summit in California.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

CVE-2015-1574 - Google Email App 4.2.2 remote denial of service

CVE-2015-1574 - Google Email App 4.2.2 remote denial of service | Hacking Wisdom | Scoop.it
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Defeating Signed BIOS Enforcement | Hacking Wisdom

Many older BIOSes still in use today are writable, and they do not adequately protect themselves, preventing BIOS from getting compromised by backdoors installation that avoid integrity threats detection.

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Fortinet Single Sign On Stack Overflow | Hacking Wisdom

There is a vulnerability in the message dispatcher used by FSSO Windows Active Directory and FSSO Novell eDirectory. Exploitation of this vulnerability might lead to a full network compromise.

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Net Neutrality approved at last | Hacking Wisdom

The Federal Communications Commission Thursday approved the net neutrality rules with a vote that finds the fierce opposition of both telecom and cable companies.

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Superfish, Komodia, PrivDog vulnerability test

Hacking Wisdom's insight:

verify if you are affected by Superfish AdWare

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Big Telecom tried to kill net neutrality before it was even a concept

Big Telecom tried to kill net neutrality before it was even a concept | Hacking Wisdom | Scoop.it
Opinion: Millions spent on campaigns, lobbying in bid to avoid common carrier label.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Obama turns back on spooks: 'I'm on the side of strong encryption'

Obama turns back on spooks: 'I'm on the side of strong encryption' | Hacking Wisdom | Scoop.it
US prez still slags off Snowden despite odd remarks
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Canuck Bitcoin exchange gives up after security SNAFU

Canuck Bitcoin exchange gives up after security SNAFU | Hacking Wisdom | Scoop.it
Cavirtex sends back money after suspected password pop
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Biter bitten as hacker leaks source code for popular exploit kit

There is no honour among thieves
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Apple adds two-step verification security to iMessage and FaceTime apps

Apple adds two-step verification security to iMessage and FaceTime apps | Hacking Wisdom | Scoop.it
Two stages of verification now needed to access the social tools
more...
No comment yet.