Matthew Garrett is a Security Developer for CoreOS, and noticed something interesting about the hotel he was staying in. They had installed tablets in the rooms to control the lights, temperature and shades. He also found that they weren’t protected.
Your browser’s private or incognito mode can be useful for many reasons, but you should always know what it is and isn’t hiding. Here’s exactly what’s happening when you launch a private window.
Are you traveling anytime soon? Well, rather than sneering at the mere sight of a TSA agent, maybe you should be stopping to give them a hug—because there’s a good chance that they’ve seen some crazy shit.
The Big Bang that created the Universe left traces of itself everywhere—an afterglow known as the cosmic microwave background (CMB). You’ve probably never thought to ask whether there’s a practical use for the CMB, but lo and behold, cosmologists found it: data encryption.
In the 21st century the familiar form of warfare in which physical damage is meted out against the opponent’s military forces and infrastructure has become only one form of attack. Instead, states are increasingly launching non-lethal attacks against an enemy’s information systems – this is the rise of information…
If Ocean’s Eleven taught us anything, it’s that planning heists is tough but entertaining. The authorities have all kinds of devices that can be used to track your stolen loot, so item number one on your planning list should be this cash-carrying sack that blocks any and all wireless tracking signals.
The last thing you ever want to do is connect a random flash drive you’ve found to your computer’s USB port. But a security researcher who goes by the nickname ‘Dark Purple’ has created an even more dangerous flash stick that can physically destroy your computer—not just infect its drives.
Every time you go from one country to the next, you cross a border. And that usually means dealing with some kind of border agency that enforces each country’s idiosyncratic rules and regulations. But what if the whole process were standardized and run by a single organization?
If you have ever visited the Vatican, you have seen the stoic guards that look like they missed the bus to the local Renaissance Festival. The truth is they are a high-end military force made up of top ex-Swiss soldiers. And don’t let those spears fool you, they can shred you to pieces with them. If that doesn’t work,…
The Mozilla Firefox web browser now blocks Flash by default. And when I say “blocks,” I don’t mean it asks you nicely if you’d really like to use Flash. I don’t mean it automatically pauses Flash videos like Google Chrome. I mean Mozilla has decided that Flash is going down.
They’re robots. They fly. They’re watching you. And they’re increasingly found everywhere: Yup, they’re drones. You may think you know exactly what they are and what they do. You don’t.
Researchers at the University of Washington in Seattle have just hijacked a teleoperated surgical robot, demonstrating major security weaknesses in the machines that may eventually replace a surgeon’s hands in hospitals worldwide. Yikes.
Every day, you hear about security flaws, viruses, and evil hacker gangs that could leave you destitute — or, worse, bring your country to its knees. But what’s the truth about these digital dangers? We asked computer security experts to separate the myths from the facts. Here’s what they said.
On Wednesday evening, the news began to break on Twitter. Computer security analysts had discovered something nefarious about a piece of advertising software called Superfish, which comes pre-installed on cheap Lenovo laptops like the Yoga 2. Superfish was leaving the laptops wide open to takeover by malicious…
Saudi Arabia is building great wall — or rather, a great chainlink fence with razor wire — to "protect against ISIS" in Iraq. And it's not the only country investing in very expensive walls right now, even though they probably won't work. Why? Because walls aren't just about security. They're also powerful symbols.
The recent Sony hacking scandal just proved what's already been clear to a lot of people for years: cyberattacks are an ever-increasing threat, and we're not ready. Luckily, a book released last year provides an excellent primer on this sort of situation: P.W. Singer and Allan Friedman's Cybersecurity and Cyberwar:…
A member of the Chaos Computer Club has shown how you can use photos to reconstruct a person's fingerprint — and to prove his point, he replicated the thumbprint of the German defense minister, Ursula von der Leyen.
If the Sony hack has taught us anything, it's that keeping incriminating emails in your inbox is a terrible idea. Even if you aren't doing anything particularly bad, if someone gets into you email, everything you've ever said could be out in the open. Here's how to make sure that doesn't happen by automatically…
America's nukes are in a shocking state of neglect. A recent Pentagon review found outdated equipment, weak leadership, and abysmal morale among the people responsible for maintaining and launching these massively destructive weapons. Billions of dollars will be required over the next five years to ensure its security…