This year, Android malware is expected to increase 200% when compared with its level in 2013. According to researchers at G Data, over 6,000 Android malware samples a day were discovered in the second quarter of 2015. There are a number of reasons for this startling increase. First of all, over 64% of the world … Continue reading The Android Malware Invasion: Here Are Three of the Worst
Yesterday, CIA Director John Brennan put up a reference to an article in the Daily Dot on his Facebook page The article indicated that his alleged hacker had distanced himself from his initial claims. “The hacker originally told the New York Post that he had accessed ‘[Brennan's] 47-page application for top-secret security clearance.’ But, that … Continue reading Wikileaks Releases Documents Stolen from CIA Director John Brennan, But Many Questions Remain Unanswered
I’m sure you’ve all heard this story before, often from your parents or grandparents. The general theme is, “I’ve got nothing to hide. If someone wants to hack into my computer then let them do it.” Such an attitude can only come from people who do not understand what hackers can do with a person's … Continue reading Hacking Grandma
Looked at solely from a software design perspective, the Volkswagen architecture for undermining emissions testing is really quite clever. VW’s so-called ‘defeat device’ knows that the car is being tested and puts the engine into cheat mode. After the test, the car ‘realizes’ it’s safe to return to its normal state. True, environmental agencies may … Continue reading Why Buy a Volkswagen to Cheat Emissions Testing When You Can Do That Yourself?
In the cyber world, no one trusts anyone. In the real world, nations may have partners and allies; however, as soon as these relationships are taken into the cyber realm, all trust seems to evaporate. There’s a good reason for this lack of trust. Evidence seems to indicate that, in the cyber world, everyone really … Continue reading Meet America’s New Cyber Ally…Iran?