Web design and development blog providing you with knowledge and inspiration.
Uber is working towards fixing the flaws in their in-car technology and they are turning to two security researchers. Charlie Miller and Chris Valasek are now pretty well-known for hacking into Chrysler’s Uconnect system and putting it on display for the security world at Black Hat and DefCon security conferences. “The hiring of Miller and Valasek is likely part of an…
Unfortunately we live in a world where everything in technology is game for cyber hackers looking to steal your information or just plain accomplish the goal of hacking devices. A new company is trying to help mobile users figure out when apps might be malicious simply through a processing chip and alert system. “That little voice — most likely it’s your…
If you’re a frequenter to the Google Play app you may have noticed the search is looking a bit different, some might even say better than it has ever looked before. The company has redesigned their search system into an attractive grid display of the app icons when you begin a search. “The grid is broken up into multi-colored boxes…
Be careful tech companies, interns are smarter than you think. A former security intern at the FireEye security firm has admitted to designing the malicious software spyware that could have quite dangerous to millions of Android users. “Morgan Culbertson, 20, pleaded guilty to federal charges involving Dendroid, a software tool that provided everything needed to develop highly stealthy apps that…
Some Ashley Madison users have something in common with many internet users when it came to their security passwords. 4,000 of the underlying plaintext passwords from the leak have been deciphered and you could probably guess some of the passwords that were used. Hint: we mentioned one three times in the first two sentences. 123456, password, 12345, qwerty, ashley, abc123…
One of the largest drug marketplaces on the Dark Web is going offline after they reported suspicious activity on their site. Agora’s site operators would like themselves as well as their servers to remain a secret and in order to do so they plan on going offline to strengthen their site incase of future attacks. “In a message posted both…
Everyone has had at least one gripe with the way that Facebook has be redesigned in the past. One designer says that there are flaws in it’s current desktop design and offers their opinion of how it should be redesigned with the idea of a flatter design being one of the first things designers might notice in the mock up.…
It looks like Google and Android have something to worry about as an application is exploiting the Android OS through the Google Play store. The exploit is allowing the application to gain remote-access to the operating systems easily bypassing Google security and user permissions. “While the app was discovered installed on an infinitesimal percentage of devices checked by Check Point,…
Web designers sometimes struggle with applications or software they use to help them create bold and successful designs. For Mac users, this can be pretty challenging as well. However, MacWorld‘s Nathan Alderman has shone the light on the EverWeb design app that he says should be pretty useful for beginners and professional designers. “No single Mac web design app offers the…
In the tech industry many companies and sites have begun releasing bounties for bugs and security flaws detected within their system. Ashley Madison, the online relationship-cheating website is taking things to a new level by issuing a $377,000 bounty for the hackers that essentially turned their business upside down. “Amid reports that the Ashley Madison security breach may have led…
There are all types of cyber-hacks out there and in some cases they can be detrimental to accomplishing a larger, greater cause. The Mexican students who set out to protest in Iguala is one of those instances, not because it contributed to the reported capture and killing of the students, but because an attempt to organize and fight against such…
When Charlie Miller and Chris Valasek demonstrated their ability to hack vehicles both with physical contact and purely wireless, they weren’t aware that this would turn into a much larger discussion about safety on the roads. Now reports are saying that this is just the beginning of an “auto-hacking era.” “While the automakers and telematics vendors with targeted products were largely receptive to…
When Google announced it’s build-you-own smartphone project it was questionable whether it would be a hit with smartphone users. It looks like it will remain questionable as the company has delayed the launch of the project in order to further perfect the hardware and software they plan on offering buyers. “Google’s Ara phones work by letting people snap together the…
While Quantum computing might only be theoretical at this point, the National Security Agency is beginning to warn U.S. agencies and businesses to take caution incase there is a future attack on the way. “The National Security Agency is advising US agencies and businesses to prepare for a time in the not-too-distant future when the cryptography protecting virtually all e-mail,…
As leaks of years past proved, the complexity of user passwords weren’t always at their best. Some users might have thought if they actually used the work “password” or a variation of it hackers would never guess it. It’s a large flaw in thinking that still exists and according to new reports, the failure to complete strong passcodes has been…
Drupal has released it’s latest batch of updates 7.39 and 6.37 amidst security vulnerabilities that are now remedied by the new versions. Both Drupal 6 and 7 contained multiple security vulnerabilities but with the new updates the company is urging users to use the updates and protect themselves from further damage. “Upgrading your existing Drupal 7 and 6 sites is strongly…
The Ashley Madison hack wasn’t just another way to show the world that it doesn’t pay to cheat, it also serves as another reminder of how dangerous hackers can be if they get a hold of your information. “The massive leak attributed to the hackers who rooted to the Ashley Madison dating website for cheaters has been confirmed to be genuine,” according…
Mobile devices are personal to the user and you’d be lying if you said you wouldn’t miss it in today’s world. Like any technological device, your cell phones can also get you into a lot of trouble if hackers are able to infiltrate it. So, what device will let you communicate without risking being spied on? “If you want to communicate really securely,…
Web designers and content creators don’t always see eye to eye. Either designers have a problem with he content that is being provided or content creators can’t seem to get with the layout and want designers to change them all together on the whim. There is a way to work through these rifts according to Ashley Taylor Anderson of Business…
While the initial report of the recent U.S. IRS breach stated that an estimate of 114,000 households had their data stolen, new reports are showing that the number might actually be in the 300,000 range, making yet another large-scale hack that makes Americans think twice about the security of their personal information. “Those attackers were much more successful at answering…
Micro-interactions happen on a daily basis with all technological devices and most of the times they are completely overlooked. One reporter is raising the question as to whether or not these micro-interactions are the secret to great designs. “As a designer, recognizing the invisibility of micro-interactions is just as important as designing them,” said Carrie Cousins of The Next Web.…
If you’re an Apple user, last week’s update was a much needed security update. The update has essentially built a wall against hackers who were seeking total control over the entire OS. “Released on Thursday, Mac OS X 10.10.5 resolves scores of holes and technical glitches. But one serious bug in particular was squashed along with the rest,” according to CNET. “The…
Not even Google’s patch can stop a vulnerability that gives the StageFright bug is still alive and kicking despite a recent update to remedy the vulnerability. The ball doesn’t stop rolling there, MWR Labs research team found another flaw which could render the Android security sandbox defenseless. “The first involves the update Google released last week fixing a flaw that allowed attackers to…
It’s not just the American automakers that need to worry about car hacks, BMW and Mercedes-Benz also share the same vulnerabilities that make them susceptible to a GM-styled OnStar hack. “When security researcher Samy Kamkar revealed a bug in GM’s OnStar service last month that allowed a hacker to hijack its RemoteLink smartphone app, he warned that GM wouldn’t be the…
Aspects of design are what fuels first impressions to any site or company and Google’s new Alphabet logo looks to be pointing towards a more mature look which is perfect for their parent company. “Given the confusion surrounding the announcement, Alphabet’s visual identity plays a vital role helping people understand the differences between the two companies,” says Wired. “Whereas Google’s goofy logo reflected…
Not a day goes by where a new hack is makes headlines and this time the networking and communications manufacturer Cisco has become the target. Attackers have began targeting critical networking gear from the company which allows them to install malware and steal passwords to alter Cisco hardware. “The attackers use valid administrator credentials, an indication the attacks are being…
Even supercars can be hacked according to a new study where researchers at the Unsenix security conference demonstrated how to cut the brakes on a Chevrolet Corvette. This is yet another study that might raise more questions as to exactly how dangerous can a vehicles computerized components be if they are hacked. What makes many consumers exhale a sigh of…
Software bugs are becoming almost as common as the countless amounts of car hacks that has stolen the attention of consumers. Now, attackers are using “booby-trapper” USB sticks to exploit a bug in Windows. The good news is, Microsoft has released a patch. “An elevation of privilege vulnerability exists when the Mount Manager component improperly processes symbolic links,” according to…
While pumping your gas your biggest concern might be the charges on your card or the high prices. It never occurred to you that Internet-connected gas pumps we use on a daily basis could be exploited by hackers and ultimately lead to very dangerous consequences. “If attackers could cause a gas station’s tanks to overflow or prevent leak alarms from sounding,…
If you’re like my uncle who has a piece of duct tape over his webcam, you’re probably just as terrified of being spied on and having footage leaked onto the internet by hackers. At Black Hat 2015 in Las Vegas, it’s been revealed that “Remote Access Trojans” are the aids of hackers who are stealing intimate video footage and uploading it…
Recently the DefCon cyber security and hacker conference took place in Las Vegas and one journalist has learned that there really is no such thing as total security on the Internet. Yes, there are many security measures that can be taken to lower your chances of being hacked, however, the fact of the matter is, you’re still very susceptible to…
One ingenious hacker has come up with a way to satisfy his cat’s primal instincts by developing a custom-built machine that releases a portion of cat food when the cat delivers balls equipped with an electronic chip. The Daily Mail is reporting that Benjamin Millam has developed radio-frequency identification (RFID) enabled balls and a custom feeding machine in order to allow his…
There will never be a shortage of hacker news especially when it comes to high stakes attacks like the recent one carried out on the Pentagon’s Joint Staff unclassified email system. News outlets have been reporting that Russia has been cited as the root of the attack though the hack is still under investigation. “U.S. officials tell NBC News that…
A printer is just a printer right? Wrong. A researcher is taking it back to the Cold War days after he figured out how to turn a laser printer into a covert radio. “During the Cold War, Soviet spies were able to monitor the US Embassy in Moscow by using a radioretroreflector bug—a device powered, like modern RFID tags, by…
The cyber car hacks looks as if they are becoming a game for researchers as they have now hijacked a Tesla Model S, a car that was said to be almost immune to thieves. No, they didn’t hot wire the car, instead, they use a computer and one of the cars network table. “Two researchers have found that they could…
A vicious code-execution bug has been swimming around the Android universe and could cause millions of phones to become susceptible to malicious code simply by receiving a “malformed” text message or if you happen to visit a malicious site on you Android device by accident. However, Google isn’t taking any chances and the company has already began sharing a fix…
After China was suspected to be involved in a large government hack on the U.S., the country has decided to take things into their own hands by having police present in some of the countries largest Internet countries. This new plan is in attempt to stop “criminal behavior online” quicker, however, experts say it could lead to increased censorship. “The…
The world can never have enough web developers. With coding and programming only recently hitting schools in the U.S., those who don’t want to pay thousands of dollars to attend development classes in college now have a cheaper alternative. “The road to becoming an established web developer is a challenging, but readily accessible one,” said Business Insider. “Even if you avoided…
Cruising around on an electric skateboard might sound like fun, but it’s all fun and games until a hacker decides he/she wants to throw you off your joyride and wipe the joy away. New reports are showing that electric skateboards can be targeted by hackers and this could potentially lead to death if they seize control of the boards under…
Car hacks seemed like they were appearing out of the woodwork and but General Motors consumers can rest assure that there is a solution to the recently exposed OnStar hack that could locate your vehicle and start your engine. “On Friday afternoon, GM OnStar announced a software update to its RemoteLink app for iPhone to patch a security vulnerability that…
Last week we reported on the 0-Day exploit that has found its way into the latest update of Apple’s OS X and the danger can be pretty substantial especially since the malware doesn’t need victims to enter their passwords. “Developers didn’t use standard safeguards involving additions to the OS X dynamic linker dyld, a failure that lets attackers open or…
HitchBOT has traveled the world- beginning its journey in Canada and traveling through Europe and New York City- but met it’s demise after a group of vandals destroyed it in Philadelphia. Now, a Philly-based tech group is offering to help rebuild it. For those unfamiliar with hitchBOT, its the product of a couple of Canadian researchers who wanted to test…
Last week consumers found out that Jeep as well as other Chrysler and GM vehicles were susceptible to being hacked. Phones have always been a little lackadaisical in security and now, even more surprising, hackers can also find their way into certain high tech rifles bringing a whole new meaning to the term cyber hacking. “The biggest cybersecurity conferences of…
Apple’s Mac series came with a notion that they are less susceptible to malware or firmware attacks. They were said to be internally stronger and because of that people often convert to Macs. Now, researchers have developed a firmware worm that will completely put that notion to shame. “Two researchers have found that several known vulnerabilities affecting the firmware of…