Web design and development blog providing you with knowledge and inspiration.
Have you ever wanted to getaway and escape your environment in a remote area, without having to give up Internet access? Well, it looks like Facebook is developing a drone that could provide high-speed internet access to remote areas of the world. “The drone – which has a wingspan of a Boeing 737 – will operate as high as 90,000…
Bringing down the Internet seemed like a task that hackers can only dream about. However, nowadays it seems like hackers are getting closer to dangerous attacks like one “lone-wolf hacker” who could exploit a security flaw with a critical bug and bring down parts of the Internet. “A recently disclosed vulnerability in Bind, the most widely used software for translating…
Every automobile company has been trying their best to pander to the publics cries for increased technology and support for mobile devices, however, while there is new technology being put into cars there are hackers trying to figure out a way to hack into vehicles remotely. A new report is showing that there is a gadget that can hack GM cars…
When everyday PC users hear the words hack a flurry of worry sets it because they are instantly concerned as to whether their personal information has been stolen. While there is still much cause to worry about these hacks, it looks like government’s intelligence might also want to start worrying about the potential dangers. “Bloomberg reported Wednesday that United Airlines…
Recently, companies have been giving away valuable source code to non-profit organizations for no cost, but not because they’ve mounted their moral high horse. In fact, open source projects are the way of the future. For those unfamiliar, open source is code that is publicly available and therefore available to be modified and redistributed freely. According to The Wire, “Google…
Malware developers are getting smarter at what they do as the new software called Hammertoss has managed to change the way hackers can steal your information, by mimicking regular computer use. “A new type of malware found by security company FireEye mimics normal computer user behavior the entire time it’s compromising files on a victim’s machine,” reports CNET. “It can…
A huge hack on the Anthem health insurance company left the companies insured open to potentially big dangers, including anyone who classifies as a government worker. What is more dangerous, is the fact that it’s not the first time Black Vine has been successful with such hacks. “An attack in early 2014 on Anthem, the No. 2 US health insurer, was…
Tech companies across all sectors are looking to move past algorithms alone to add a human side via curation to their products, says Time. Time says that despite the accuracy and ease of algorithms, big Silicon Valley tech giants are not leaving the human touch to the wayside. It uses the example of Facebook, which despite using a “closely guarded”…
Android users may want to be on alert as a new report reveals that their devices can be hacked with a text, due to a massive security flaw in the phones software. “A security research company has found what it’s calling “the mother of all Android vulnerabilities” – a flaw in the popular mobile operating system that could give hackers access…
Australia was one of the countries that were reportedly slacking when it came to cyber security protection and now after a recent WikiLeaks publication, the country has been brought further into the Government Surveillance and cyber security discussion. Hacking Team’s emails were leaked by WikiLeaks and showed that Australian companies were trying to sell law enforcement as well as the…
Cyber security is in arguably one of it’s most controversial states yet and after a recent hack on the Ashley Madison affair website, Australia is now expressing their concern over holes in their governments cyber security that could potentially risk the personal data from businesses. “The hackers who have threatened chaos to the lives of customers of US-based adultery website Ashley Madison…
You can add another nation to the long list of hacking countries as Ethiopia has now come under suspicion of hacking into a former Ethiopian citizen who no resides in the U.S. One of the big hacking debates right now is whether or not the Ethiopian government had the right to spy on a Maryland man and his family because…
Apple can’t seem to stop putting their hands on new ways to make life easier for consumers and now, it looks like they are thinking about developing a remote control that will allow your personal viewing preferences and profile to be accessed with a fingerprint or retina. “A patent application called ‘Device Configuration for Multiple Users Using Remote User Biometrics‘ published…
Microsoft Internet Explorer might not be the most popular browser and the latest four code-execution bug might be another reason for users to shy away from the browser. “Researchers at an HP security division have publicly detailed four code-execution vulnerabilities that can be used to hijack end-user machines running the latest versions of Microsoft’s Internet Explorer browser,” according to Arstechnica.…
If you’re a Google Chrome user, you might have been subjecting yourself to 43 security problems that were deemed critical by the company. “On Wednesday, Google pushed Chrome 44 for Windows, Mac and Linux to the stable channel and for public release,” according to CNET. “As part of the Chrome 44.0.2403.89 update, 43 bugs have been fixed, with many of the bugs submitted by…
Microsoft took a lot of negativity from users regarding their last software update but CEO Satya Nadella is keeping his hopes high for the release of Windows 10. “While the PC ecosystem has been under pressure recently, I do believe that Windows 10 will broaden our economic opportunity and return Windows to growth,” Nadella said according to Geek Wire. He…
Italian company Hacking Team is launching an investigation into over 400 GB of leaked documents;it believes former employees might have teamed up with suspected hackers to orchestrate the leak. The document revealed company documents and source code and has been big news for the past two weeks, since the leak occurred. Now, Italian prosecutors are reportedly investigating the possibility that…
There are a plethora of companies who enlist the help of Lifelock as a source of protection for thousands of customers’ personal identification information. However, the company appears to have dropped the ball when it comes to doing what they were enlisted to do. “According to a complaint filed in court today by the Federal Trade Commission, Lifelock has failed to adhere…
If you’re a young person in the United States, working at a fast food restaurant is no big deal, just a way to earn some money. For others it’s actually what they make their living off of but Jordan Collier a determined former employee of Chick-Fil-A broke the mold and found his way to a $90,000 job as a computer…
Imagine driving down the highway in a nice Jeep Cherokee with not a care in the world, only to have it start behaving like Bumblebee from the “Transformers” film and not in a good way. This however could be the case for any vehicle, not just a Jeep Cherokee. That’s how it went for Andy Greenberg of Wired. The site…
As the PROMO cloud coding competition nears, The Register and IBM introduced a new way for developers to create applications using a cloud based platform with Bluemix. “For most developers it is a case of when not if they will need to develop, create, and deploy applications in the cloud. But how to get starting something – not such an…
In response to the Hacking Team malware that leaked documents revealed to be on computers all over the world, Facebook has released a “query pack” for users to detect the company’s malware on Mac OS X. 415 GB of leaked documents in an ironic hack revealed much about Hacking Team’s cybersecurity practices, including e-mails that indicate the company has used…
After Hacking Team had their own systems hacked, it exposed a world of cyber wrongdoing and now it looks like the team of hackers were also using drones to aid in Wi-Fi based hacking software that could cripple computers and mobile devices. “The capability, marketed as part of the company’s Remote Control System Galileo, was shown off to defense companies at…
There literally isn’t a website that is safe from the threat of hackers, even the ones you least expect to get hacker. Over 37 million registered users from the marital affair site Ashley Madison have had their personal information compromised by hackers. According to Tech Crunch Brian Krebs was the first to report the news that The Impact Team published random…
Countries all over the world have been rushing to tighten up the security and surveillance of their countries online community but a recent U.K. High Court ruling might be a minor setback for officials. The High Court ruled that emergency surveillance is unlawful. “In a high profile win for civil liberties in the U.K., surveillance legislation rushed through the national parliament in…
The FBI and US Department of Justice had turned out the lights on a cybercriminal forum that doubled as a marketplace for hackers to buy and sell malicious data called “Darkode.” The marketplace was responsible for malicious software, stolen credit card data, lifted passwords and more according to a CNET report. The operation was called “Operation Shrouded Horizon,” where law enforcement…
The Alliance of Automobile Manufacturers, a unity of twelve different automakers, announced that it will be creating an information and analysis center through which the companies will be able to address cyber security threats targeting vehicle software. “The organization said that the new center will be up and running later on this year, and that it will be distributing cyber threat information…
Jordan Wiens, the man who exposed a severe bug on the United Airlines website, is now rich, well, rich in airline miles that is. He’s been rewarded 1 million miles for helping them fix a bug that could have caused major damaged if it was exploited. “That is a lot of airline miles and is equivalent to 40 round trips…
Most of the new cars that are being rolled out come with the promise of all new technology. However, a recent report proves that some of the so-called “new” technology actually dates back 80 years or more. So is all the new technology just a way for companies to jack up the prices of their rides? “Your car seems to…
While it is still highly unclear what the real story is behind the recent U.S. government hacks, a new report is suggesting that China is building a database of Americans, using the information they allegedly acquired through The Office of Personnel Management hacks. “In a report on Sunday, Bloomberg outlined evidence that Chinese state-sponsored hacks targeting the United States over the last few…
Adobe Systems is once again finding it hard to keep its Flash media player safe. The company issued its second patch to remedy “critical zero-day vulnerabilities.” The security holes are allowing hackers to upload malware on users computers. “The previously unknown vulnerabilities were unearthed in the 400-gigabyte data dump hackers published nine days ago after rooting the servers of Hacking Team, the Italy-based…
The West Coast, specifically San Francisco is really becoming a place of gathering for hopeful web developers who are trying to find their big break. However, one place in particular stands out from the rest and it comes in the form of a 41 room “Hostel.” In “A Week Inside A Hacker Hostel,” Ashley Gilbertson explores one of the premiere…
Being in the IT business and being a developer whether you’re on the coding or programming spectrum, can be a very rewarding career. For many in their respective countries, web development can make you a pretty good living. What about those who are looking to do a little more with their skills, say, help a nonprofit organization out? Tech Republic‘s Lyndsey Gilpin…
The cyber warfare got much more interesting last week given the glitches in the NYSE and the grounding of United Airlines flights. While the U.S. and a few other countries are looking into gaining access of all encrypted communications Peter G. Neumann, a computer security expert and pioneer, says that it’s not a good idea. “An elite group of security…
Theodore Henderson, a bestselling author and authority in social media security and cybersecurity, is launching his new training website: SocialMediaAndCyberSecurity.com (SMCS). Henderson has over 20 years of experience in technology sales management and holds an MBA from the New York Institute of Technology. The Cybersecurity awareness program is designed to make participants aware of their organization’s computers and online presences, such as social media accounts and how they…
Splunk, the San Francisco based company that is a leading platform in operational intelligence has made a $190m deal to purchase security start-up Caspida in an effort to expand what it offers by way of cyber security. “Caspida’s technology centers on detecting malware or unusual activity inside a corporate network. If there’s a bug in the network or if someone…
This is certainly one of the hacks of the century that seems to keep getting bigger. The Office of Personnel Management said that more than 21 million Social Security numbers of federal employees were compromised in the most recent hack. “That number is in addition to the 4.2 million social security numbers that were compromised in another data breach at…
Apple has finally made their iOS 9 and OS X El Capitan software available for beta testers, where new features like the improved Siri can be experienced. “The iOS 9 beta build will allow early adopters to try out upcoming features, including new apps like News and a refreshed Notes, transit directions in Apple Maps, an improved Siri, a smarter search which lets…
It looks like there is some bad news for South Americans, at least according to WikiLeaks frontman Julian Assange who claims that the NSA is intercepting 98% of all South American communications. “Ninety-eight percent of Latin American communications are intercepted by the NSA while passing through the United States to the world,” Assange said in an interview with the publication,…
Digital currency never seemed more vulnerable after reports surfaced that there is a new software that allows hackers to steal Bitcoin from your brain. Brainflayer is the name of the technology that will be featured at the DefCon hacker conference. “For bitcoin fans, the notion of a ‘brain wallet’ has long seemed like the ideal method of storing your cryptocurrency: By simply remembering…
MasterCard is shifting mobile banking to another level and celebrities such as “Selfish” creator Kim Kardashian might be on board with this one for sure. The company is introducing a new facial scan program that will approve online purchases making it harder for hackers to make fraudulent purchases. “‘The new generation, which is into selfies … I think they’ll find…
It’s looking progressively worst when it comes to privacy and security in the U.S. especially for mobile users. According to a new report, the Federal Bureau of Investigation might be looking into making proposals that would put every mobile device and their chat history in danger. “The U.S. government just lost highly classified security-clearance data to foreign hackers. Do Americans…
During a campaign stop in New Hampshire, presidential hopeful Hillary Clinton discussed the importance of focusing on cybersecurity as she claimed that China tries to “hack into anything that doesn’t move in America,” bringing cybersecurity to the forefront of campaign issues for the moment. The presidential hopeful and also former Secretary of State accused China of “stealing commercial secrets, blueprints…
Being a hacker or a hacking team doesn’t make you immune to hacks. One team finds out the hard way as Hacking Team, an Italian surveillance firm, had a barrage of internal documents leaked through a “400 gigabyte trove on bittorrent.” “Few News Events can unleash more schadenfreude within the security community than watching a notorious firm of hackers-for-hire become a…
Users don’t expect their wireless router to be tool for hackers to use against them, but a recent report shows that there are certain flaws in wireless routers that could be very costly to users. “Our inattention to routers has been a security problem for years, most recently last week when Brian Krebs reported that researchers at the Fujitsu Security Operations Center…
A new proposal proposed at ICANN will look to limit access to proxy and privacy services which could expose web owners personal information such as their address to the entire Internet. “When you register a domain, you must post information, including an address, phone number and email to a global database called WHOIS,” according to Sarah Jeong and Kendra Albert…
Security flaws are becoming very dangerous for users of various software companies across the globe. A new Adobe threat has the company urging it’s users to download the latest version of Flash or they could be the victim of a malware like attack. “China-based advanced persistent threat spotted using the Flash flaw, which has now entered malware kit Magnitude,” reported…
$75/month doesn’t seem like much considering your average cell phone plan usually costs more than that. But when you’re sending out email blasts to your subscribers, that price tag is a cause for concern. It also happens to be what MailChimp charges for only 10,000 subscribers. I own a few websites, and I have one site with a healthy list…
Not even Apple could stop developer Benjamin Rumble from finding an unencrypted stream for Apple Music‘s Beats 1 Radio that Android users can listen to via an embedded link on his own website. “One of the surprisingly better features found in Apple’s new streaming music service, Apple Music, which launched yesterday to much fanfare, is its human-DJ’d Beats 1 radio station which broadcasts to 100…
A research paper revealed at a major cybersecurity conference held at Tel Aviv University in Israel this past week discusses the easiness of creating an electronic device made from cheap parts to hack into a given laptop. Authors of the paper “Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation” Daniel Genkin, Itamar Pipman, Lev Pachmanov,…
Microsoft has released another Windows 10 iteration, the 10159 build that. reports said claim over 300 bug fixes. “We’d been using 10158 for almost a week and knew it was going to be a strong build, and the data backed that up so we released it yesterday,” said Gabe Aul in the Windows blog, according to Tech2. “Hot on its…
The leading website creators are not companies like Wix or Squarespace, but installed versions of content management systems. Wordpress leads the charge, but there are millions of sites that are installed directly onto an owners server. This gives them full flexibility for customization, but it also leaves them incredibly vulnerable. If you have an old Joomla 1.0 build and it…
The Amazon Skill Kit is not the only tool that the online retail giant plans on providing developers. The company is also investing $100 million into the Alexa Voice Development project that invites developers from companies all over to participate in. “The company will house its investment under the Alexa Fund, named after the cloud-based virtual assistant voice service behind its…
MIT’s Computer Science and Artificial Intelligence Laboratory has taken recycling to a whole other level as they have developed a way to fix software bugs with “healthy code from other applications.” The new development even allows coders to fix the issues without having to go back to the original source code. “Think of it as an organ transplant. Except in…