July 25, 2013 |
At least 2 million people received the email May 16 notifying them that an order they had just made on "Wallmart's" website was being processed, though none of them had done any such thing. Still, thousands of people clicked on the link in the email, taking many of them to a harmless Google search results page for "Walmart. " Others weren't so fortunate. The link led to the invisible download of malware that covertly infected their personal computers, turning them into remotely controlled robots for hackers, according to email security firm Proofpoint Inc. These sorts of "phishing" attacks are not only becoming more common but also are getting more lethal, with fake emails becoming harder to distinguish from real ones.
June 23, 2013 |
Question: I read with interest the articles concerning the use of magnetic stripe and Chip and PIN cards in Europe and, as a result, have just obtained a Chip and PIN card. The customer service representative added one caveat: "Bad guys" in Europe have a device that can read the PIN from some distance from the location of the transaction and can then fraudulently use it for their own purposes. She strongly advised the purchase of a protective sleeve that can thwart this illegal use. Albert P. Taylor North Tustin Answer: Every transaction carries some risk, security experts agree, but the agent seems to have conflated a couple of security concerns.
June 17, 2013 |
In late February, a thief or thieves cracked into Evernote's digital vault filled with log-ins, passwords and email addresses belonging to 50 million users. It was a shocking cyber attack considering the Redwood City, Calif., company offers online lockers for people to safely store their files. With its reputation on the line, the company quickly developed a security feature that may become the standard procedure for accessing online accounts: demanding two digital keys to gain entrance.
June 10, 2013 |
WASHINGTON - Security experts questioned Monday how, three years after Army Pfc. Bradley Manning downloaded a trove of secret material, low-level computer specialist Edward Snowden was able to copy documents that are far more sensitive and walk them out of his National Security Agency workplace in Hawaii. After Manning released hundreds of thousands of classified documents - for which he is now being court-martialed - government officials vowed to curtail the broad access to intelligence that came into being after the Sept.
May 16, 2013 |
The thriller "Erased" divides neatly by influence. When Brussels-based tech security expert Ben Logan (Aaron Eckhart) shows up for work one day, there's no trace of his company anymore, a la "Three Days of the Condor. " Like the "Bourne" movies, he's then targeted for elimination, (when we learn he's actually ex-CIA and highly skilled at killing). He's also a single dad with a teenage daughter (Liana Liberato) in tow, and that creates its fair share of peril, "Taken" you very much. As with many one-man-against-an-international-conspiracy movies, details like who did what, when, for which piece of information and why it's so important mean little once the chases, spy moves and fights hit cruise control.
February 7, 2013 |
Imagine if North Korea or Iran or Venezuela deployed thousands of unmanned surveillance aircraft in search of earthbound enemies, a swarm of robotic hunters armed with lethal weaponry and their governments' go-ahead to exterminate targets. It's a frightening scenario but far from an unimaginable one, given that dozens of nations now build, program and deploy their own drones. Newly disclosed U.S. guidelines on drone warfare appear to authorize a more permissive practice of targeted killings in the global fight against terrorism than previously articulated.