Portable authenticators, tiny devices that you can carry on your keychain for an added level of security, appear to be one of the best ways to ensure that your digital identities can’t be hacked. The way that these authenticators work is by displaying a new code every 60 seconds and are entered along with a password or a pin to gain access to an account. So if a hacker was able to steal your password in some way, they would also need your personal authenticator to log into your account.

Read More →

gadgetsAs we stumble headlong into the next generation of Web-enabled gadgets, oftentimes we look at what’s “cool” and what’s “innovative” moreso than what’s “secure.” This see-no-evil mentality has encouraged lackadaisical programmers to cut corners in the development of HDTVs, smartphones, and countless other products, which has, in turn, given rise to new avenues for hackers and scam artists.

Read More →

Students joke about teachers having eyes in the back of their heads. For Wafaa Bilal, a New York University photography professor, this isn’t a viagra online simple jest. And while he doesn’t have a literal eye in the back of his skull, he instead buy clomid installed a functioning pharmacy in canada camera.

Read More →

ssn_logoNEW YORK-Well, despite the economy, we know at least a few physical security players have grown in the last few years. The Inc. 500/5000, a list of “the fastest-growing small companies” as defined by rate of growth over the period from 2006 through 2009, was released this week and includes the likes of VMS-maker Exacq, integrators Security By Design and Intelligent Access Systems, residential firms like Defender Direct and Pinnacle Security, and online distributor Brickhouse Security.

Read More →

hackedcarWith cars becoming more computerized and Internet-enabled with programs such as OnStar, the risk of computer-based security breaches also grows. Computer security researchers from the University of Washington and the University of California, San Diego (UCSD) have proven that it’s possible to remotely control many of a car’s functions by hacking its computer from a remote location.

Read More →

energizerResearchers at the United States Computer Emergency Readiness Team (US-CERT) say that the Energizer Bunny DUO USB battery charger is infected with a trojan horse that allows hackers to steal personal information from a Window’s PC.

Energizer Holdings ascertained late Friday that the USB-powered nickel hydride battery recharger was contaminated with malicious code, and the product has since been discontinued.

As of now the company does not know how the hacking was done. “Energizer is currently working with both CERT and U.S. government officials to understand how the code was inserted in the software,” Energizer said in a statement.

The Windows software included with the Energizer DUO is supposed to display charging status. After the software is installed, a Trojan that steals and transmits files is created. Even if the charger is disconnected from the computer, the Trojan continues to steal and alter information whenever the computer is on.

According to US-CERT officials, if you think your computer is infected you are advised to uninstall the software. Another method is to remove the Arucer.dll from Windows’ “system32 ” directory and restart your computer.

(Via Network World)

Read More →

pleaserobme2comPeople have become more and more obsessed with status updates; whether it’s on Twitter or Facebook, people are all about letting others in on what they’re doing and where they’re going and what exactly they’re doing. Programs like Foursquare, let users check into different locations and find friends that may be in your same location. The more you visit certain spots, you move up in the ranking and unlock badges and points, eventually getting to “mayor” status the more you visit. The more these types of apps take off, the more security concerns they raise.

Read More →
PD*25346346

More than 100 Section 44 stop and search areas exist in London alone

In the United Kingdom, police are using their power to “stop and search” on innocent photographers taking pictures of tourist attractions and in one case, even a chip shop. Section 44 authorization zones are areas where police can stop and search anyone without a reason. These zones were created to allow police to help fight terrorism. This law also allows senior officers to designate entire areas as stop and search areas. However, just because someone is taking a photo doesn’t mean that they should be detained.

Read More →